CVE-2022-23098

high

Description

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

References

https://git.kernel.org/pub/scm/network/connman/connman.git/log/

https://www.openwall.com/lists/oss-security/2022/01/25/1

https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html

https://www.debian.org/security/2022/dsa-5231

Details

Source: MITRE

Published: 2022-01-28

Updated: 2022-09-29

Type: CWE-835

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH