First published: Thu Jun 22 2006(Updated: )
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Bluetooth Wireless Device Driver | <=4.00.29 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.11 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.12 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.31a | |
Toshiba Bluetooth Wireless Device Driver | =3.00.32 | |
Toshiba Bluetooth Wireless Device Driver | =3.01.03 | |
Toshiba Bluetooth Wireless Device Driver | =3.10.00 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.00 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.01 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.02 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.04 | |
Toshiba Bluetooth Wireless Device Driver | =4.00.01t | |
Toshiba Bluetooth Wireless Device Driver | =4.00.11 | |
Toshiba Bluetooth Wireless Device Driver | =4.00.23 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3146 has a high severity level due to its potential to cause a denial of service resulting in a reboot of affected systems.
To fix CVE-2006-3146, update your Toshiba Bluetooth Stack to a version later than 4.00.29 or apply the recommended patches if available.
CVE-2006-3146 affects Toshiba Bluetooth Stack versions 4.00.29 and earlier, as well as specific versions from 3.00.11 to 4.00.23.
CVE-2006-3146 allows attackers to remotely trigger a reboot on vulnerable systems, leading to potential service disruption.
No, Microsoft Windows itself is not vulnerable to CVE-2006-3146 but the vulnerability affects the Toshiba Bluetooth Stack installed on Windows.