Show filters
43 Total Results
Displaying 21-30 of 43
Sort by:
Attacker Value
Unknown

CVE-2021-0129

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
Attacker Value
Unknown

CVE-2021-3588

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.
Attacker Value
Unknown

CVE-2020-24490

Disclosure Date: February 02, 2021 (last updated November 28, 2024)
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
Attacker Value
Unknown

CVE-2020-27153

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
Attacker Value
Unknown

CVE-2020-12270

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
React Native Bluetooth Scan in Bluezone 1.0.0 uses six-character alphanumeric IDs, which might make it easier for remote attackers to interfere with COVID-19 contact tracing by using many IDs. NOTE: the vendor disputes the relevance of this report because the recipient of an F1 alert will know it was a false alert if contact-history comparison fails (i.e., an F0 is not actually part of the contact history obtained from the device of this recipient, or this recipient is not actually part of the contact history obtained from the device of an F0)
Attacker Value
Unknown

CVE-2020-0556

Disclosure Date: March 12, 2020 (last updated November 27, 2024)
Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
Attacker Value
Unknown

CVE-2018-10910

Disclosure Date: January 28, 2019 (last updated November 27, 2024)
A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth devices without any form of authentication. Versions before bluez 5.51 are vulnerable.
0
Attacker Value
Unknown

CVE-2017-1000250

Disclosure Date: September 12, 2017 (last updated November 26, 2024)
All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
0
Attacker Value
Unknown

CVE-2016-7837

Disclosure Date: June 09, 2017 (last updated November 26, 2024)
Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
0
Attacker Value
Unknown

CVE-2016-9917

Disclosure Date: December 08, 2016 (last updated November 25, 2024)
In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.