First published: Mon Jul 07 2008(Updated: )
src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ | <=3.30 | |
BlueZ | <=3.33 | |
BlueZ | <3.34 | |
BlueZ | <3.34 | |
Fedora | =8 | |
Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2374 has a severity rating that indicates it could lead to denial of service due to improper validation of string length fields.
To fix CVE-2008-2374, update to BlueZ libraries version 3.34 or later as it contains the necessary security patches.
CVE-2008-2374 affects BlueZ versions prior to 3.34, including all versions up to and including 3.30.
Yes, CVE-2008-2374 can be exploited remotely by sending crafted SDP packets to vulnerable services.
The potential impacts of CVE-2008-2374 include denial of service and possibly other unspecified impacts due to unvalidated input.