{"id":"CVE-2023-28488","details":"client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.","modified":"2026-04-16T04:32:48.652328956Z","published":"2023-04-12T16:15:19.353Z","related":["openSUSE-SU-2023:0369-1","openSUSE-SU-2023:0370-1","openSUSE-SU-2024:13420-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5416"},{"type":"FIX","url":"https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138"},{"type":"FIX","url":"https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/network/connman/connman.git","events":[{"introduced":"f0aaa277e1712359701b158e5c43f7cc5c2d46d5"},{"last_affected":"4a27c58ad8b1afd980ebe122ca178c7f659c025e"}],"database_specific":{"versions":[{"introduced":"0.55"},{"last_affected":"1.41"}]}}],"versions":["0.55","0.56","0.57","0.58","0.59","0.60","0.61","0.62","0.63","0.64","0.65","0.66","0.67","0.68","0.69","0.70","0.71","0.72","0.73","0.74","0.75","0.76","0.77","0.78","0.79","0.80","0.81","0.82","0.83","0.84","0.85","1.0","1.1","1.10","1.11","1.12","1.13","1.14","1.15","1.16","1.17","1.18","1.19","1.2","1.20","1.21","1.22","1.23","1.24","1.25","1.26","1.27","1.28","1.29","1.3","1.30","1.31","1.32","1.33","1.34","1.35","1.36","1.37","1.38","1.39","1.4","1.40","1.41","1.5","1.6","1.7","1.8","1.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28488.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}