First published: Fri May 03 2024(Updated: )
BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/bluez | <5.48-0ubuntu3.9+ | 5.48-0ubuntu3.9+ |
ubuntu/bluez | <5.53-0ubuntu3.8 | 5.53-0ubuntu3.8 |
ubuntu/bluez | <5.64-0ubuntu1.3 | 5.64-0ubuntu1.3 |
ubuntu/bluez | <5.68-1 | 5.68-1 |
ubuntu/bluez | <5.37-0ubuntu5.3+ | 5.37-0ubuntu5.3+ |
debian/bluez | <=5.55-3.1+deb11u1<=5.66-1+deb12u1 | 5.66-1+deb12u2 5.77-1 |
redhat/bluez | <5.67 | 5.67 |
BlueZ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27349 is a critical vulnerability that allows remote code execution via Bluetooth, requiring user interaction to exploit.
To fix CVE-2023-27349, update the BlueZ package to versions 5.48-0ubuntu3.9+, 5.53-0ubuntu3.8, 5.64-0ubuntu1.3, 5.68-1, or ensure you are on a patched version for your distribution.
Users of certain BlueZ versions across various Linux distributions such as Ubuntu, Debian, and Red Hat are affected by CVE-2023-27349.
CVE-2023-27349 allows attackers to execute arbitrary code remotely through a Bluetooth connection.
Yes, user interaction is required for an attacker to successfully exploit CVE-2023-27349.