{"id":"CVE-2021-33833","details":"ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).","modified":"2026-03-13T04:58:42.453867Z","published":"2021-06-09T18:15:08.797Z","related":["MGASA-2021-0331","openSUSE-SU-2024:10692-1"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/06/09/1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html"},{"type":"ADVISORY","url":"https://lore.kernel.org/connman/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-29"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/01/25/1"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33833.json","unresolved_ranges":[{"events":[{"introduced":"1.30"},{"last_affected":"1.39"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}