Source: bluez
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for bluez.

CVE-2023-51592[0]:
| BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read
| Information Disclosure Vulnerability. This vulnerability allows
| network-adjacent attackers to disclose sensitive information via
| Bluetooth on affected installations of BlueZ. User interaction is
| required to exploit this vulnerability in that the target must
| connect to a malicious device.  The specific flaw exists within the
| handling of the AVRCP protocol. The issue results from the lack of
| proper validation of user-supplied data, which can result in a read
| past the end of an allocated buffer. An attacker can leverage this
| in conjunction with other vulnerabilities to execute arbitrary code
| in the context of root. Was ZDI-CAN-20854.

It's not clear whether this has been properly reported upstream:
https://www.zerodayinitiative.com/advisories/ZDI-23-1905/


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51592
    https://www.cve.org/CVERecord?id=CVE-2023-51592

Please adjust the affected versions in the BTS as needed.

Reply via email to