Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-9800

Опубликовано: 03 дек. 2016
Источник: nvd
CVSS3: 5.3
CVSS2: 5
EPSS Низкий

Описание

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:bluez:bluez:5.42:*:*:*:*:*:*:*

EPSS

Процентиль: 59%
0.00387
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

CVSS3: 2.5
redhat
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

CVSS3: 5.3
debian
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" ...

CVSS3: 5.3
github
больше 3 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

suse-cvrf
около 7 лет назад

Security update for bluez

EPSS

Процентиль: 59%
0.00387
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Дефекты

CWE-119