Bluetooth Vulnerability Allows Arbitrary Code Execution with User Interaction
CVE-2023-44431
Summary
The vulnerability identified within the BlueZ Bluetooth protocol stack relates to a stack-based buffer overflow occurring during the processing of the Audio/Video Remote Control Profile (AVRCP). This specific flaw arises from insufficient validation of user-supplied data length before it is copied to a fixed-size stack-based buffer. An attacker in close proximity can exploit this vulnerability by enticing a user to connect their device to a malicious Bluetooth-enabled device. Upon a successful connection, the attacker may execute arbitrary code in the context of the user, potentially leading to unauthorized access and control over system resources. This could pose significant risks to the security and integrity of the affected installations.
Affected Version(s)
BlueZ 5.66
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved