Heap-based Buffer Overflow in BlueZ Affects Bluetooth Connectivity
CVE-2023-50229
Currently unrated
Summary
A vulnerability exists within BlueZ's implementation of the Phone Book Access Profile, where improper validation of user-supplied data allows an attacker to exploit a heap-based buffer overflow. By connecting to a malicious Bluetooth device, the attacker can execute arbitrary code in the context of the affected system, potentially compromising its security. Proper safeguards against untrusted data interaction are crucial to mitigate this risk.
References
EPSS Score
6% chance of being exploited in the next 30 days.
Timeline
Vulnerability published