SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BlueZ Vendors:   bluez.org
BlueZ Input Validation Bug May Let Local Users Gain Elevated Privileges or Certain Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020479
SecurityTracker URL:  http://securitytracker.com/id/1020479
CVE Reference:   CVE-2008-2374   (Links to External Site)
Date:  Jul 14 2008
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.30 and prior versions
Description:   A vulnerability was reported in BlueZ. A local user can obtain elevated privileges. A remote user may be able to execute arbitrary code.

The Bluetooth Session Description Protocol (SDP) packet parser does not properly validate user-supplied input. A local user that can register a service record via a UNIX socket or D-Bus interface may be able to execute arbitrary code with the privileges of the hcid daemon.

A remote Bluetooth device with an established trust relationship with the target system can return a specially crafted SDP packet in response to an SDP query from the target system to potentially execute arbitrary code on the target system.

The vulnerability resides in 'sdp.c'.

Impact:   A local user can execute arbitrary code on the target system with the privileges of the hcid daemon.

A remote Bluetooth device with an established trust relationship can execute arbitrary code on the target system.

Solution:   The vendor has issued a source code patch.

The vendor's advisory is available at:

http://article.gmane.org/gmane.linux.bluez.devel/15809/

Vendor URL:  bluez.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 14 2008 (Red Hat Issues Fix) BlueZ Input Validation Bug May Let Local Users Gain Elevated Privileges or Certain Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 4 and 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC