GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
References
Link | Resource |
---|---|
https://github.com/labapart/gattlib/issues/82 | Exploit Issue Tracking Third Party Advisory |
https://github.com/labapart/gattlib/issues/81 | Issue Tracking Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46215/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-01-20 22:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-6498
Mitre link : CVE-2019-6498
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
labapart
- gattlib