The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4561 - Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3981 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/100809 - Patch, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039373 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:2679 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2680 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2681 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2682 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2683 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2704 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2705 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2706 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2707 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2731 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2732 - Third Party Advisory | |
References | () https://access.redhat.com/security/vulnerabilities/blueborne - Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe - Patch, Third Party Advisory | |
References | () https://www.armis.com/blueborne - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42762/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.kb.cert.org/vuls/id/240311 - Third Party Advisory, US Government Resource | |
References | () https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne - Third Party Advisory |
Information
Published : 2017-09-12 17:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000251
Mitre link : CVE-2017-1000251
CVE.ORG link : CVE-2017-1000251
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
nvidia
- jetson_tx1
- jetson_tk1
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write