First published: Fri May 03 2024(Updated: )
BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19909. <a href="https://www.zerodayinitiative.com/advisories/ZDI-23-1900/">https://www.zerodayinitiative.com/advisories/ZDI-23-1900/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE BlueZ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2278969 is considered high due to the potential for remote code execution via Bluetooth.
To fix REDHAT-BUG-2278969, update your BlueZ installation to the latest version that addresses this vulnerability.
REDHAT-BUG-2278969 is a stack-based buffer overflow vulnerability affecting the AVRCP audio profile in BlueZ.
Devices using affected versions of BlueZ with Bluetooth functionality are at risk of exploitation through this vulnerability.
Yes, user interaction is required to exploit REDHAT-BUG-2278969, as the attack necessitates the target to accept a Bluetooth connection.