hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack.
events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf
mulliner.org/bluetooth/hidattack.php
osvdb.org/32830
secunia.com/advisories/23747
secunia.com/advisories/23798
secunia.com/advisories/23879
secunia.com/advisories/25264
www.mandriva.com/security/advisories?name=MDKSA-2007:014
www.redhat.com/support/errata/RHSA-2007-0065.html
www.securityfocus.com/archive/1/455889/100/0/threaded
www.securityfocus.com/bid/22076
www.ubuntu.com/usn/usn-413-1
www.vupen.com/english/advisories/2007/0200
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10208