Bluez

Bluez

37 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Veröffentlicht 10.06.2021 03:15:07
  • Zuletzt bearbeitet 21.11.2024 06:21:54

The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.

  • EPSS 0.13%
  • Veröffentlicht 09.06.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:01

Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

  • EPSS 5.6%
  • Veröffentlicht 02.02.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:14:54

Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.

  • EPSS 1.9%
  • Veröffentlicht 15.10.2020 03:15:12
  • Zuletzt bearbeitet 21.11.2024 05:20:47

In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT eve...

  • EPSS 0.16%
  • Veröffentlicht 12.03.2020 21:15:14
  • Zuletzt bearbeitet 21.11.2024 04:53:45

Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access

Exploit
  • EPSS 0.06%
  • Veröffentlicht 28.01.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:16

A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth devices without any form of authentication...

Exploit
  • EPSS 39.93%
  • Veröffentlicht 12.09.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the proces...

  • EPSS 0.38%
  • Veröffentlicht 09.06.2017 16:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 08.12.2016 08:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 03.12.2016 06:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from fra...