Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9802

Опубликовано: 03 дек. 2016
Источник: redhat
CVSS3: 2.5
CVSS2: 1.2
EPSS Низкий

Описание

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bluez-toolsNot affected
Red Hat Enterprise Linux 6bluezNot affected
Red Hat Enterprise Linux 7bluezWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1401541bluez: buffer over-read in l2cap_packet()

EPSS

Процентиль: 64%
0.00476
Низкий

2.5 Low

CVSS3

1.2 Low

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

CVSS3: 5.3
nvd
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

CVSS3: 5.3
debian
около 9 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" fun ...

CVSS3: 5.3
github
больше 3 лет назад

In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

suse-cvrf
больше 6 лет назад

Security update for bluez

EPSS

Процентиль: 64%
0.00476
Низкий

2.5 Low

CVSS3

1.2 Low

CVSS2