Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
| Software | From | Fixed in |
|---|---|---|
| intel / connman | - | 1.34.x |
| debian / debian_linux | 8.0 | 8.0.x |