Lucene search

K
gentooGentoo FoundationGLSA-200508-09
HistoryAug 17, 2005 - 12:00 a.m.

bluez-utils: Bluetooth device name validation vulnerability

2005-08-1700:00:00
Gentoo Foundation
security.gentoo.org
14

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.9%

Background

bluez-utils are the utilities for use with the BlueZ implementation of the Bluetooth wireless standards for Linux.

Description

The name of a Bluetooth device is improperly validated by the hcid utility when a remote device attempts to pair itself with a computer.

Impact

An attacker could create a malicious device name on a Bluetooth device resulting in arbitrary commands being executed as root upon attempting to pair the device with the computer.

Workaround

There are no known workarounds at this time.

Resolution

All bluez-utils users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/bluez-utils-2.19"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-wireless/bluez-utils< 2.19UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.9%