Логотип exploitDog
bind:"CVE-2019-8922"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-8922"

Количество 11

Количество 11

ubuntu логотип

CVE-2019-8922

около 4 лет назад

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-8922

почти 7 лет назад

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2019-8922

около 4 лет назад

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-8922

около 4 лет назад

A heap-based buffer overflow was discovered in bluetoothd in BlueZ thr ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2900-1

больше 3 лет назад

Security update for bluez

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2864-1

больше 3 лет назад

Security update for bluez

EPSS: Низкий
github логотип

GHSA-r763-g6p5-r323

около 4 лет назад

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2021-05954

почти 7 лет назад

Уязвимость функций service_attr_req и process_request (sdpd-request.c) стека протоколов Bluetooth для ОС Linux BlueZ, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2948-1

больше 3 лет назад

Security update for bluez

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3691-1

больше 3 лет назад

Security update for bluez

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3687-1

больше 3 лет назад

Security update for bluez

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-8922

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2019-8922

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-8922

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
0%
Низкий
около 4 лет назад
debian логотип
CVE-2019-8922

A heap-based buffer overflow was discovered in bluetoothd in BlueZ thr ...

CVSS3: 8.8
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:2900-1

Security update for bluez

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2864-1

Security update for bluez

0%
Низкий
больше 3 лет назад
github логотип
GHSA-r763-g6p5-r323

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

CVSS3: 8.8
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2021-05954

Уязвимость функций service_attr_req и process_request (sdpd-request.c) стека протоколов Bluetooth для ОС Linux BlueZ, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.8
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2022:2948-1

Security update for bluez

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3691-1

Security update for bluez

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3687-1

Security update for bluez

больше 3 лет назад

Уязвимостей на страницу