4 results (0.003 seconds)

CVSS: 8.8EPSS: 71%CPEs: 4EXPL: 0

The Bluetooth Stack 2.1 in Microsoft Windows Vista SP1 and SP2 and Windows 7 Gold and SP1 does not prevent access to objects in memory that (1) were not properly initialized or (2) have been deleted, which allows remote attackers to execute arbitrary code via crafted Bluetooth packets, aka "Bluetooth Stack Vulnerability." La pila de Bluetooth v2.1 en Microsoft Windows Vista SP1 y SP2 y Windows 7 Gold y SP1 no impide el acceso a los objetos en la memoria que (1) no se ha inicializado correctamente o (2) se han eliminado, lo que permite a atacantes remotos ejecutar código arbitrario a través de paquetes Bluetooth manipulados, también conocido como "Vulnerabilidad de la pila de Bluetooth". • http://www.us-cert.gov/cas/techalerts/TA11-193A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-053 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12094 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405. Vulnerabilidad no especificada en Toshiba Bluetooth Stack anterior a 4.20.01 tiene un impacto desconocido y vectores de ataque, relacionados con 4.20.01(T) "Security fix." NOTA: debido a la carencia de detalles del vendedor consultado, no está claro si esta edición está relacionada con CVE-2006-5405. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook https://exchange.xforce.ibmcloud.com/vulnerabilities/44391 •

CVSS: 5.0EPSS: 15%CPEs: 15EXPL: 1

The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23. El controlador TOSRFBD.SYS para Toshiba Bluetooth Stack v4.00.29 y anteriores en Windows permite a atacantes remotos provocar una denegación de servicio (reinicio) a través de una solicitud L2CAP echo que provoca una acceso "fuera de rango" a memoria, similar al "Ping de la Muerte" tal y como lo demuestra BlueSmack. NOTA: este problema fue reportado originalmente para v4.00.23. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2 http://attrition.org/pipermail/vim/2006-October/001085.html http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html http://secunia.com/advisories/20657 http://securitytracker.com/id?1016345 http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html http://trifinite.org/trifinite_advisory_toshiba.html http://www.osvdb.org/26686 http://www.securityfocus.com/archive/1/437811/100/0/threaded http:&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 1

Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push. Vulnerabilidad de salto de directorio en servicios OBEX Push en Toshiba Bluetooth Stack 4.00.23(T) y versiones anteriores permite a atacantes remotos subir archivos arbitrarios a localizaciones remotas arbitrarias especificadas por secuencias .. (punto punto), según lo demostrado por secuencias ..\\ en el argumento RFILE de ussp-push. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2 http://marc.info/?l=full-disclosure&m=113712413907526&w=2 http://secunia.com/advisories/18437 http://securitytracker.com/id?1015486 http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt http://www.osvdb.org/22380 http://www.securityfocus.com/archive/1/421993/100/0/threaded http://www.securityfocus.com/bid/16236 http://www.vupen.com/english/advisories/2006/0184 •