
CVE-2016-9918
https://notcve.org/view.php?id=CVE-2016-9918
08 Dec 2016 — In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash. En BlueZ 5.42, una lectura fuera de límites fue identificada en la función "packet_hexdump" en el archivo fuente "monitor/packet.c". Este problema puede ser desencadenado procesando un archivo de volcado corrupto y resultará en una caída btmon. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00054.html • CWE-125: Out-of-bounds Read •

CVE-2006-6899 – BlueZ 1.x/2.x - HIDD Bluetooh HID Command Injection
https://notcve.org/view.php?id=CVE-2006-6899
31 Dec 2006 — hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack. hidd en BlueZ (bluez-utils) anterior a 2.25 permite a atacantes remotos obtener el control de los Dispositivos de Interfaz Humana (HID) del (1) Ratón y (2) Teclado mediante una determinada configuración de dos extremos HID (PSM) (HID endpoints), operando como servidor, tam... • https://www.exploit-db.com/exploits/29471 • CWE-16: Configuration •

CVE-2006-0670
https://notcve.org/view.php?id=CVE-2006-0670
13 Feb 2006 — Buffer overflow in l2cap.c in hcidump 1.29 allows remote attackers to cause a denial of service (crash) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet. Desbordamiento de bufér en l2cap.c en hcidump 1.29 permite a atacantes remotos provocar una denegación de servicio (caída) a través de una conexión inalámbrica de Bluetooth a través de un paquete Logical Link Control and Adaptation Protocol (L2CAP) malformado. • http://marc.info/?l=full-disclosure&m=113924625825488&w=2 •

CVE-2005-2547
https://notcve.org/view.php?id=CVE-2005-2547
12 Aug 2005 — security.c in hcid for BlueZ 2.16, 2.17, and 2.18 allows remote attackers to execute arbitrary commands via shell metacharacters in the Bluetooth device name when invoking the PIN helper. • http://cvs.sourceforge.net/viewcvs.py/bluez/utils/hcid/security.c?r1=1.31&r2=1.34 •