We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response.
Reserved 2025-04-05 | Published 2025-04-05 | Updated 2025-04-15 | Assigner mitreCWE-130 Improper Handling of Length Parameter Inconsistency
web.git.kernel.org/...connman.git/tree/src/dnsproxy.c?h=1.44
web.git.kernel.org/...connman.git/tree/src/dnsproxy.c?h=1.44
lapis-sawfish-be3.notion.site/...00d01d080688472d322c93c4340
web.archive.org/...ory-Leak-190dc00d01d080688472d322c93c4340
Support options