In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
History

Thu, 10 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
Description In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
Weaknesses CWE-392
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-10T00:00:00.000Z

Updated: 2025-04-10T14:30:27.850Z

Reserved: 2025-04-10T00:00:00.000Z

Link: CVE-2025-32743

cve-icon Vulnrichment

Updated: 2025-04-10T14:30:20.652Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-10T14:15:29.740

Modified: 2025-04-11T15:39:52.920

Link: CVE-2025-32743

cve-icon Redhat

No data.