Количество 10
Количество 10
CVE-2016-9800
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
CVE-2016-9800
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
CVE-2016-9800
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
CVE-2016-9800
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" ...
GHSA-pcrc-6m42-jvr8
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
openSUSE-SU-2018:4259-1
Security update for bluez
SUSE-SU-2018:4189-1
Security update for bluez
SUSE-SU-2018:4188-1
Security update for bluez
SUSE-SU-2018:1778-1
Security update for bluez
SUSE-SU-2019:0510-1
Security update for bluez
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-9800 In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter. | CVSS3: 5.3 | 0% Низкий | около 9 лет назад | |
CVE-2016-9800 In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter. | CVSS3: 2.5 | 0% Низкий | около 9 лет назад | |
CVE-2016-9800 In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter. | CVSS3: 5.3 | 0% Низкий | около 9 лет назад | |
CVE-2016-9800 In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" ... | CVSS3: 5.3 | 0% Низкий | около 9 лет назад | |
GHSA-pcrc-6m42-jvr8 In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter. | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2018:4259-1 Security update for bluez | около 7 лет назад | |||
SUSE-SU-2018:4189-1 Security update for bluez | около 7 лет назад | |||
SUSE-SU-2018:4188-1 Security update for bluez | около 7 лет назад | |||
SUSE-SU-2018:1778-1 Security update for bluez | больше 7 лет назад | |||
SUSE-SU-2019:0510-1 Security update for bluez | почти 7 лет назад |
Уязвимостей на страницу