First published: Fri Sep 08 2017(Updated: )
An attacker within bluetooth transmission range can cause a stack buffer overflow in the Bluetooth system of the Linux kernel while processing pending L2CAP configuration responses from a client. An unauthenticated user able to connect to a system via Bluetooth could use this flaw to potentially execute arbitrary code with root privileges on the system. External References: <a href="https://www.armis.com/blueborne/">https://www.armis.com/blueborne/</a> <a href="https://access.redhat.com/security/vulnerabilities/blueborne">https://access.redhat.com/security/vulnerabilities/blueborne</a> <a href="https://access.redhat.com/solutions/3177231">https://access.redhat.com/solutions/3177231</a> <a href="https://access.redhat.com/blogs/product-security/posts/blueborne">https://access.redhat.com/blogs/product-security/posts/blueborne</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=4.12.12-2<=3.12.9-1 | 3.16.43-2+deb8u4 4.9.30-2+deb9u4 4.12.13-1 |
Linux Kernel | >=2.6.32<3.2.94 | |
Linux Kernel | >=3.3<3.16.49 | |
Linux Kernel | >=3.17<3.18.71 | |
Linux Kernel | >=3.19<4.1.45 | |
Linux Kernel | >=4.2<4.4.88 | |
Linux Kernel | >=4.5<4.9.50 | |
Linux Kernel | >=4.10<4.12.13 | |
Linux Kernel | >=4.13<4.13.2 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
All of | ||
Any of | ||
NVIDIA Jetson TK1 | =r21 | |
NVIDIA Jetson TK1 | =r24 | |
NVIDIA Jetson TX1 L4T | =r21 | |
NVIDIA Jetson TX1 L4T | =r24 | |
Linux Kernel | ||
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.2 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =6.7 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server eus | =7.7 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
NVIDIA Jetson TK1 | =r21 | |
NVIDIA Jetson TK1 | =r24 | |
NVIDIA Jetson TX1 L4T | =r21 | |
NVIDIA Jetson TX1 L4T | =r24 | |
Linux Kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000251 is classified with a high severity due to its ability to result in a stack buffer overflow in the Linux kernel Bluetooth system.
To fix CVE-2017-1000251, upgrade to the appropriate patched versions of the Linux kernel listed in the vulnerability details.
CVE-2017-1000251 affects multiple versions of the Linux kernel and Debian GNU/Linux systems as well as certain NVIDIA Jetson devices.
Yes, attackers within Bluetooth transmission range can exploit CVE-2017-1000251 to execute arbitrary code.
While specific exploit code for CVE-2017-1000251 may not be publicly available, the nature of the vulnerability allows for potential exploitation given the right conditions.