Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9802

Опубликовано: 03 дек. 2016
Источник: debian

Описание

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bluezunfixedpackage

Примечания

  • https://www.spinics.net/lists/linux-bluetooth/msg68898.html

  • Crash in btmon CLI tool, no security impact

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

CVSS3: 2.5
redhat
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

CVSS3: 5.3
nvd
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

CVSS3: 5.3
github
больше 3 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

suse-cvrf
больше 6 лет назад

Security update for bluez