Lucene search

K
archlinuxArchLinuxASA-202003-13
HistoryMar 19, 2020 - 12:00 a.m.

[ASA-202003-13] bluez: access restriction bypass

2020-03-1900:00:00
security.archlinux.org
8

7.1 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

41.5%

Arch Linux Security Advisory ASA-202003-13

Severity: High
Date : 2020-03-19
CVE-ID : CVE-2020-0556
Package : bluez
Type : access restriction bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-1116

Summary

The package bluez before version 5.54-1 is vulnerable to access
restriction bypass.

Resolution

Upgrade to 5.54-1.

pacman -Syu “bluez>=5.54-1”

The problem has been fixed upstream in version 5.54.

Workaround

None.

Description

It was discovered that the HID and HOGP profiles implementations in
bluez before 5.54 don’t specifically require bonding between the device
and the host. This creates an opportunity for a malicious device to
connect to a target host to either impersonate an existing HID device
without security or to cause an SDP or GATT service discovery to take
place which would allow HID reports to be injected to the input
subsystem from a non-bonded source.
This potentially enables an unauthenticated attacker with adjacent
access to impersonate an existing HID device, cause a denial of service
or escalate privileges.

Impact

An unauthenticated attacker with adjacent access can impersonate an
existing HID device, or cause a denial of service.

References

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
https://www.openwall.com/lists/oss-security/2020/03/12/4
https://lore.kernel.org/linux-bluetooth/[email protected]/
https://patchwork.kernel.org/patch/11428317/
https://patchwork.kernel.org/patch/11428319/
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8cdbd3b09f29da29374e2f83369df24228da0ad1
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3cccdbab2324086588df4ccf5f892fb3ce1f1787
https://security.archlinux.org/CVE-2020-0556

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanybluez< 5.54-1UNKNOWN

7.1 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

41.5%