Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95067 | Third Party Advisory VDB Entry |
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 | Patch Third Party Advisory |
https://jvn.jp/en/jp/JVN38755305/index.html | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/4311-1/ |
Configurations
History
No history.
Information
Published : 2017-06-09 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-7837
Mitre link : CVE-2016-7837
CVE.ORG link : CVE-2016-7837
JSON object : View
Products Affected
bluez
- bluez
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer