We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32366



Description

In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response.

Reserved 2025-04-05 | Published 2025-04-05 | Updated 2025-04-15 | Assigner mitre


MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L

Problem types

CWE-130 Improper Handling of Length Parameter Inconsistency

Product status

Default status
unaffected

Any version
affected

References

web.git.kernel.org/...connman.git/tree/src/dnsproxy.c?h=1.44

web.git.kernel.org/...connman.git/tree/src/dnsproxy.c?h=1.44

lapis-sawfish-be3.notion.site/...00d01d080688472d322c93c4340

web.archive.org/...ory-Leak-190dc00d01d080688472d322c93c4340

cve.org (CVE-2025-32366)

nvd.nist.gov (CVE-2025-32366)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32366

Support options

Helpdesk Chat, Email, Knowledgebase