Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-7837

Опубликовано: 10 сент. 2016
Источник: redhat
CVSS3: 2.2
EPSS Низкий

Описание

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bluez-utilsWill not fix
Red Hat Enterprise Linux 6bluezWill not fix
Red Hat Enterprise Linux 7bluezWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1425117bluez: Buffer overflow in parse_line function

EPSS

Процентиль: 59%
0.00381
Низкий

2.2 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

CVSS3: 7.8
nvd
больше 8 лет назад

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

CVSS3: 7.8
debian
больше 8 лет назад

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execut ...

CVSS3: 7.8
github
больше 3 лет назад

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

suse-cvrf
больше 8 лет назад

Security update for bluez

EPSS

Процентиль: 59%
0.00381
Низкий

2.2 Low

CVSS3