First published: Fri Jun 09 2017(Updated: )
Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | <=5.41 | |
ubuntu/bluez | <4.101-0ubuntu13.3 | 4.101-0ubuntu13.3 |
ubuntu/bluez | <5.43-1 | 5.43-1 |
ubuntu/bluez | <5.37-0ubuntu5.3 | 5.37-0ubuntu5.3 |
debian/bluez | 5.55-3.1+deb11u1 5.66-1+deb12u2 5.66-1+deb12u1 5.73-1.1 |
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2016-7837.
The severity rating of CVE-2016-7837 is high with a score of 7.8.
The affected software is BlueZ versions 5.41 and earlier.
An attacker can exploit this vulnerability by executing arbitrary code via the parse_line function used in some BlueZ userland utilities.
To mitigate this vulnerability, update BlueZ to version 4.101-0ubuntu13.3 (for Ubuntu 14.04 Trusty), version 5.43-1 (for Ubuntu upstream), version 5.37-0ubuntu5.3 (for Ubuntu 16.04 Xenial), or a later version.