In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Apr 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations. | |
Weaknesses | CWE-392 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-10T00:00:00.000Z
Updated: 2025-04-10T14:30:27.850Z
Reserved: 2025-04-10T00:00:00.000Z
Link: CVE-2025-32743

Updated: 2025-04-10T14:30:20.652Z

Status : Awaiting Analysis
Published: 2025-04-10T14:15:29.740
Modified: 2025-04-11T15:39:52.920
Link: CVE-2025-32743

No data.