First published: Sun Dec 31 2006(Updated: )
Buffer overflow in the Bluetooth Stack COM Server in the Widcomm Bluetooth stack, as packaged as Widcomm Stack 3.x and earlier on Windows, Widcomm BTStackServer 1.4.2.10 and 1.3.2.7 on Windows, Widcomm Bluetooth Communication Software 1.4.1.03 on Windows, and the Bluetooth implementation in Windows Mobile or Windows CE on the HP IPAQ 2215 and 5450, allows remote attackers to cause a denial of service (service crash) and possibly execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Widcomm Bluetooth Software | =1.4.1.03 | |
Widcomm Bluetooth Software | =1.3.2.7 | |
Widcomm Bluetooth Software | <=3 | |
Windows Mobile Connectivity Tools | ||
Microsoft Windows CE | ||
Widcomm Bluetooth Software | =1.4.2.10 | |
Microsoft Windows Embedded |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6908 has a high severity due to its potential for remote code execution through a buffer overflow.
CVE-2006-6908 affects several versions of the Widcomm Bluetooth stack, specifically versions 1.3.2.7, 1.4.1.03, and up to 3.x, along with Windows Mobile and Windows CE.
To mitigate CVE-2006-6908, users should upgrade to the latest version of the Widcomm Bluetooth software that addresses this vulnerability.
CVE-2006-6908 allows an attacker to exploit a buffer overflow in the Bluetooth stack, potentially leading to arbitrary code execution.
CVE-2006-6908 is not a zero-day vulnerability as it was publicly disclosed and has known mitigation strategies.