CVE-2016-7837

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/95067 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95067 - Third Party Advisory, VDB Entry
References () https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 - Patch, Third Party Advisory () https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 - Patch, Third Party Advisory
References () https://jvn.jp/en/jp/JVN38755305/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/jp/JVN38755305/index.html - Third Party Advisory, VDB Entry
References () https://usn.ubuntu.com/4311-1/ - () https://usn.ubuntu.com/4311-1/ -

Information

Published : 2017-06-09 16:29

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7837

Mitre link : CVE-2016-7837

CVE.ORG link : CVE-2016-7837


JSON object : View

Products Affected

bluez

  • bluez
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer