Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9800

Опубликовано: 03 дек. 2016
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was deferred
cosmic

ignored

end of life
devel

deferred

disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was deferred [2020-01-06]]
esm-infra/bionic

deferred

esm-infra/focal

deferred

esm-infra/xenial

deferred

Показывать по

EPSS

Процентиль: 59%
0.00387
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 2.5
redhat
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

CVSS3: 5.3
nvd
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

CVSS3: 5.3
debian
около 9 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" ...

CVSS3: 5.3
github
больше 3 лет назад

In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.

suse-cvrf
около 7 лет назад

Security update for bluez

EPSS

Процентиль: 59%
0.00387
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3