GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
References
Link | Resource |
---|---|
https://github.com/labapart/gattlib/issues/81 | Exploit Issue Tracking Third Party Advisory |
https://github.com/labapart/gattlib/issues/82 | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/46215/ | Exploit Third Party Advisory VDB Entry |
https://github.com/labapart/gattlib/issues/81 | Exploit Issue Tracking Third Party Advisory |
https://github.com/labapart/gattlib/issues/82 | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/46215/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/labapart/gattlib/issues/81 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/labapart/gattlib/issues/82 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46215/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-01-21 06:29
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6498
Mitre link : CVE-2019-6498
CVE.ORG link : CVE-2019-6498
JSON object : View
Products Affected
labapart
- gattlib
CWE
CWE-125
Out-of-bounds Read