Page 8 of 42 results (0.010 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash. En BlueZ 5.42, se ha identificado una sobrelectura de búfer en la función "l2cap_packet" en la fuente de archivo "monitor/packet.c". Este problema puede ser desencadenado procesando un archivo de volcado corrupto y resulta en una caída de btmon. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html http://www.securityfocus.com/bid/94652 https://www.spinics.net/lists/linux-bluetooth/msg68898.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

In BlueZ 5.42, an out-of-bounds read was observed in "le_meta_ev_dump" function in "tools/parser/hci.c" source file. This issue exists because 'subevent' (which is used to read correct element from 'ev_le_meta_str' array) is overflowed. En BlueZ 5.42, una lectura fuera de límites ha sido observada en la función "le_meta_ev_dump" en la fuente de archivo "tools/parser/hci.c". Este problema existe debido a que 'subevent' (que es usado para leer correctamente elementos del array 'ev_le_meta_str') está desbordado. • http://www.securityfocus.com/bid/94652 https://www.spinics.net/lists/linux-bluetooth/msg68892.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

In BlueZ 5.42, a buffer overflow was observed in "pklg_read_hci" function in "btsnoop.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash. En BlueZ 5.42, se ha observado un desbordamiento de búfer en la función "pklg_read_hci" en la fuente de archivo "btsnoop.c". Este problema puede ser desencadenado procesando un archivo de volcado corrupto que resulta en una caída de btmon. • http://www.securityfocus.com/bid/94652 https://www.spinics.net/lists/linux-bluetooth/msg68898.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read. src/sdp.c de bluez-libs 3.30 en BlueZ, y otras bluez-libs anteriores a 3.34 y bluez-utils anteriores a 3.34, no validan la longitud de los campos de cadena en paquetes SDP, lo que permite a servidores SDP provocar una denegación de servicio y es posible que tenga otros efectos, a través de una longitud de campo manipulada que dispara la reserva excesiva de posicionamiento en memoria o sobre-lectua del buffer. • http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html http://secunia.com/advisories/30957 http://secunia.com/advisories/31057 http://secunia.com/advisories/31833 http://secunia.com/advisories/32099 http://secunia.com/advisories/32279 http://secunia.com/advisories/34280 http://security.gentoo.org/glsa/glsa-200903-29.xml http://sourceforge.net/mailarchive/message.php?msg_name=b32d44000806161327u680c290au54fd21f2fef1d58e%40mail.gmail.com http://www.bluez.org/bluez-334 http:/&# • CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 5.4EPSS: 30%CPEs: 1EXPL: 1

hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack. hidd en BlueZ (bluez-utils) anterior a 2.25 permite a atacantes remotos obtener el control de los Dispositivos de Interfaz Humana (HID) del (1) Ratón y (2) Teclado mediante una determinada configuración de dos extremos HID (PSM) (HID endpoints), operando como servidor, también conocido como HidAttack. • https://www.exploit-db.com/exploits/29471 http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://mulliner.org/bluetooth/hidattack.php http://osvdb.org/32830 http://secunia.com/advisories/23747 http://secunia.com/advisories/23798 http://secunia.com/advisories/23879 http://secunia.com/advisories/25264 http://www.mandriva.com/security/advisories?name=MDKSA-2007:014 http://www.redhat.com/support/errata/RHSA-2007-0065.html http://www • CWE-16: Configuration •