Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 | Third Party Advisory |
http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 - Third Party Advisory |
28 Sep 2023, 22:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:* |
Information
Published : 2020-11-23 17:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12351
Mitre link : CVE-2020-12351
CVE.ORG link : CVE-2020-12351
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation