security.c in hcid for BlueZ 2.16, 2.17, and 2.18 allows remote attackers to execute arbitrary commands via shell metacharacters in the Bluetooth device name when invoking the PIN helper.
References
Configurations
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.sourceforge.net/viewcvs.py/bluez/utils/hcid/security.c?r1=1.31&r2=1.34 - Patch | |
References | () http://secunia.com/advisories/16453 - | |
References | () http://secunia.com/advisories/16476 - | |
References | () http://sourceforge.net/mailarchive/forum.php?thread_id=7893206&forum_id=1881 - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2005/dsa-782 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200508-09.xml - | |
References | () http://www.securityfocus.com/bid/14572 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=101557 - Patch, Vendor Advisory |
Information
Published : 2005-08-12 04:00
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2547
Mitre link : CVE-2005-2547
CVE.ORG link : CVE-2005-2547
JSON object : View
Products Affected
bluez_project
- bluez
CWE