In ConnMan through 1.44, the lookup string in ns_resolv...
Critical severity
Unreviewed
Published
Apr 10, 2025
to the GitHub Advisory Database
•
Updated Apr 10, 2025
Description
Published by the National Vulnerability Database
Apr 10, 2025
Published to the GitHub Advisory Database
Apr 10, 2025
Last updated
Apr 10, 2025
In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
References