Lucene search

K
zdiLucas Leong (@_wmliang_) of Trend Micro Zero Day InitiativeZDI-23-1811
HistoryDec 20, 2023 - 12:00 a.m.

BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability

2023-12-2000:00:00
Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
7
bluez
buffer overflow
remote code execution
phone book access profile
validation
user interaction
bluetooth device
root context

7.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

7.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%