Debian Security Advisory DSA 782-1 announces an update for bluez-utils with a vulnerability allowing remote attackers to execute arbitrary commands
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 782-1] New bluez-utils packages fix arbitrary command execution | 23 Aug 200509:47 | – | debian |
![]() | [SECURITY] [DSA 782-1] New bluez-utils packages fix arbitrary command execution | 23 Aug 200509:47 | – | debian |
![]() | CVE-2005-2547 | 12 Aug 200504:00 | – | cve |
![]() | CAN-2005-2547 | 23 Feb 202417:56 | – | cve |
![]() | Gentoo Security Advisory GLSA 200508-09 (bluez-utils) | 24 Sep 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-782-1) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200508-09 (bluez-utils) | 24 Sep 200800:00 | – | openvas |
![]() | [Full-disclosure] [ GLSA 200508-09 ] bluez-utils: Bluetooth device name validation vulnerability | 17 Aug 200500:00 | – | securityvulns |
![]() | Debian DSA-782-1 : bluez-utils - missing input sanitising | 23 Aug 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : bluez-utils (MDKSA-2005:150) | 5 Oct 200500:00 | – | nessus |
# OpenVAS Vulnerability Test
# $Id: deb_782_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 782-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_solution = "For the stable distribution (sarge) this problem has been fixed in
version 2.15-1.1.
For the unstable distribution (sid) this problem has been fixed in
version 2.19-1.
We recommend that you upgrade your bluez-utils package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20782-1";
tag_summary = "The remote host is missing an update to bluez-utils
announced via advisory DSA 782-1.
Henryk Plötz discovered a vulnerability in bluez-utils, tools and
daemons for Bluetooth. Due to missing input sanitising it is possible
for an attacker to execute arbitrary commands supplied as device name
from the remote device.
The old stable distribution (woody) is not affected by this problem
since it doesn't contain bluez-utils packages.";
if(description)
{
script_id(55163);
script_version("$Revision: 6616 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
script_bugtraq_id(14572);
script_cve_id("CVE-2005-2547");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 782-1 (bluez-utils)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"bluez-bcm203x", ver:"2.15-1.1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"bluez-cups", ver:"2.15-1.1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"bluez-pcmcia-support", ver:"2.15-1.1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"bluez-utils", ver:"2.15-1.1", rls:"DEB3.1")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo