![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-28488 |
Description: | client.c in gdhcp in ConnMan through 1.41 could be used by network- adjacent attackers (operating a crafted DHCP server) to cause a stack- based buffer overflow and denial of service, terminating the connman process. |
Test IDs: | 1.3.6.1.4.1.25623.1.1.1.1.2023.5416 1.3.6.1.4.1.25623.1.1.10.2023.0167 1.3.6.1.4.1.25623.1.1.1.2.2023.3397 1.3.6.1.4.1.25623.1.0.833774 1.3.6.1.4.1.25623.1.0.833095 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-28488 Debian Security Information: DSA-5416 (Google Search) https://www.debian.org/security/2023/dsa-5416 https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138 https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html |