BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required
Reporter | Title | Published | Views | Family All 55 |
---|---|---|---|---|
![]() | CVE-2023-50229 BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability | 3 May 202402:14 | – | vulnrichment |
![]() | BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability | 20 Dec 202300:00 | – | zdi |
![]() | CVE-2023-50229 | 3 May 202403:16 | – | nvd |
![]() | CVE-2023-50229 | 3 May 202403:16 | – | debiancve |
![]() | CVE-2023-50229 BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability | 3 May 202402:14 | – | cvelist |
![]() | CVE-2023-50229 | 3 May 202403:16 | – | osv |
![]() | USN-7222-1 bluez vulnerabilities | 22 Jan 202514:41 | – | osv |
![]() | DLA-3879-1 bluez - security update | 7 Sep 202400:00 | – | osv |
![]() | ALSA-2024:9413 Moderate: bluez security update | 12 Nov 202400:00 | – | osv |
![]() | RLSA-2024:9413 Moderate: bluez security update | 17 Mar 202520:16 | – | osv |
[
{
"vendor": "BlueZ",
"product": "BlueZ",
"versions": [
{
"version": "5.66",
"status": "affected"
}
],
"defaultStatus": "unknown"
}
]
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-23-1811/ |
github | www.github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo