First published: Fri May 03 2024(Updated: )
BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | ||
ubuntu/bluez | <5.48-0ubuntu3.9+ | 5.48-0ubuntu3.9+ |
ubuntu/bluez | <5.53-0ubuntu3.8 | 5.53-0ubuntu3.8 |
ubuntu/bluez | <5.64-0ubuntu1.3 | 5.64-0ubuntu1.3 |
ubuntu/bluez | <5.68-1 | 5.68-1 |
ubuntu/bluez | <5.37-0ubuntu5.3+ | 5.37-0ubuntu5.3+ |
debian/bluez | <=5.55-3.1+deb11u1<=5.66-1+deb12u1 | 5.66-1+deb12u2 5.77-1 |
redhat/bluez | <5.67 | 5.67 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.