Heap-based Buffer Overflow in BlueZ Affects Bluetooth Connectivity
CVE-2023-50229
8HIGH
What is CVE-2023-50229?
A vulnerability exists within BlueZ's implementation of the Phone Book Access Profile, where improper validation of user-supplied data allows an attacker to exploit a heap-based buffer overflow. By connecting to a malicious Bluetooth device, the attacker can execute arbitrary code in the context of the affected system, potentially compromising its security. Proper safeguards against untrusted data interaction are crucial to mitigate this risk.
Affected Version(s)
BlueZ 5.66
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
