Information Exposure Affecting connman package, versions <1.0-1.1
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.18% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-CONNMAN-353939
- published 1 Jan 2013
- disclosed 1 Jan 2013
Introduced: 1 Jan 2013
CVE-2012-6459 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
connman
to version 1.0-1.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream connman
package and not the connman
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.