42 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

22 Nov 2024 — BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. • https://www.zerodayinitiative.com/advisories/ZDI-24-1229 • CWE-284: Improper Access Control •

CVSS: 7.9EPSS: 3%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it t... • https://www.zerodayinitiative.com/advisories/ZDI-23-1900 • CWE-121: Stack-based Buffer Overflow •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ Audio Profile AVRCP avrcp_parse_attribute_list Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which c... • https://www.zerodayinitiative.com/advisories/ZDI-23-1903 • CWE-125: Out-of-bounds Read •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ Audio Profile AVRCP parse_media_element Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can resu... • https://www.zerodayinitiative.com/advisories/ZDI-23-1904 • CWE-125: Out-of-bounds Read •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can resul... • https://www.zerodayinitiative.com/advisories/ZDI-23-1905 • CWE-125: Out-of-bounds Read •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of OBEX protocol parameters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end... • https://www.zerodayinitiative.com/advisories/ZDI-23-1901 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

21 Dec 2023 — BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to ... • https://www.zerodayinitiative.com/advisories/ZDI-23-1902 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.1EPSS: 6%CPEs: 1EXPL: 0

20 Dec 2023 — BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to ... • https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.1EPSS: 6%CPEs: 1EXPL: 0

20 Dec 2023 — BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to ... • https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.3EPSS: 4%CPEs: 1EXPL: 0

12 Apr 2023 — BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write... • https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=f54299a850676d92c3dafd83e9174fcfe420ccc9 • CWE-129: Improper Validation of Array Index •