Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9804

Опубликовано: 03 дек. 2016
Источник: redhat
CVSS3: 2.5
CVSS2: 1.2
EPSS Низкий

Описание

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bluez-hcidumpWill not fix
Red Hat Enterprise Linux 6bluezWill not fix
Red Hat Enterprise Linux 7bluezWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1401544bluez: buffer overflow in commands_dump()

EPSS

Процентиль: 58%
0.0036
Низкий

2.5 Low

CVSS3

1.2 Low

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

CVSS3: 5.3
nvd
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

CVSS3: 5.3
debian
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" funct ...

CVSS3: 5.3
github
больше 3 лет назад

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

suse-cvrf
больше 7 лет назад

Security update for bluez

EPSS

Процентиль: 58%
0.0036
Низкий

2.5 Low

CVSS3

1.2 Low

CVSS2