跳转到帖子

Red Hat: CVE-2023-44431: bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-44431: bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (Multiple Advisories)

Severity
7
CVSS
(AV:A/AC:H/Au:N/C:C/I:C/A:C)
Published
05/03/2024
Created
11/14/2024
Added
11/13/2024
Modified
11/13/2024

Description

BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19909.

Solution(s)

  • redhat-upgrade-bluez
  • redhat-upgrade-bluez-cups
  • redhat-upgrade-bluez-cups-debuginfo
  • redhat-upgrade-bluez-debuginfo
  • redhat-upgrade-bluez-debugsource
  • redhat-upgrade-bluez-hid2hci-debuginfo
  • redhat-upgrade-bluez-libs
  • redhat-upgrade-bluez-libs-debuginfo
  • redhat-upgrade-bluez-libs-devel
  • redhat-upgrade-bluez-libs-devel-debuginfo
  • redhat-upgrade-bluez-mesh-debuginfo
  • redhat-upgrade-bluez-obexd
  • redhat-upgrade-bluez-obexd-debuginfo

References

  • CVE-2023-44431
  • RHSA-2024:9413
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…