Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-27349

Опубликовано: 03 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.1

Описание

BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.

РелизСтатусПримечание
devel

not-affected

esm-infra/bionic

released

5.48-0ubuntu3.9+esm2
esm-infra/focal

not-affected

5.53-0ubuntu3.8
esm-infra/xenial

released

5.37-0ubuntu5.3+esm4
focal

released

5.53-0ubuntu3.8
jammy

released

5.64-0ubuntu1.3
mantic

not-affected

5.68-0ubuntu1.1
noble

not-affected

5.72-0ubuntu5
upstream

released

5.68-1

Показывать по

EPSS

Процентиль: 91%
0.07141
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
redhat
около 1 года назад

BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.

CVSS3: 7.1
nvd
около 1 года назад

BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.

CVSS3: 7.1
debian
около 1 года назад

BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Co ...

suse-cvrf
около 2 лет назад

Security update for bluez

suse-cvrf
около 2 лет назад

Security update for bluez

EPSS

Процентиль: 91%
0.07141
Низкий

7.1 High

CVSS3