Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN38755305/index.html | Third Party Advisory VDB Entry |
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/95067 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/4311-1/ |
Configurations
Information
Published : 2017-06-09 09:29
Updated : 2020-04-02 17:15
NVD link : CVE-2016-7837
Mitre link : CVE-2016-7837
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
bluez
- bluez