First published: Wed Jan 22 2020(Updated: )
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Tizen | =1.0 | |
Linux Tizen | =1.0-m1 | |
Linux Tizen | =2.0 | |
Linux Tizen | =2.1 | |
Linux Tizen | =2.2 | |
Linux Tizen | =2.2.1 | |
Linux Tizen | =2.3 | |
Linux Tizen | =2.3.1 | |
Linux Tizen | =2.4 | |
Linux Tizen | =3.0 | |
Linux Tizen | =3.0-m2 | |
Linux Tizen | =3.0-m3 | |
Linux Tizen | =4.0-m1 | |
Linux Tizen | =4.0-m2 | |
Linux Tizen | =4.0-m3 | |
Linux Tizen | =5.0 | |
Samsung Galaxy Gear |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16264 is a vulnerability in the BlueZ system service in Tizen that allows an unprivileged process to partially control Bluetooth or acquire sensitive information.
CVE-2018-16264 affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
The severity of CVE-2018-16264 is medium, with a severity value of 6.5.
To fix CVE-2018-16264, it is recommended to update to Tizen 5.0 M1 or a higher version, and ensure that the Samsung Galaxy Gear series has build RE2 or a higher build.
You can find more information about CVE-2018-16264 in the provided references: [Link 1](https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf), [Link 2](https://review.tizen.org/git/?p=platform/upstream/bluez.git;a=commit;h=ff9878c95efc12d4a4495153ab51e3a09f8d3c01), [Link 3](https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be)