blob: 725701fa7194f2769ca4d585a0c04415fa7c1a51 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-09">
<title>bluez-utils: Bluetooth device name validation vulnerability</title>
Improper validation of Bluetooth device names can lead to arbitrary command
<product type="ebuild">bluez-utils</product>
<announced>August 17, 2005</announced>
<revised>August 17, 2005: 01</revised>
<package name="net-wireless/bluez-utils" auto="yes" arch="*">
<unaffected range="ge">2.19</unaffected>
<vulnerable range="lt">2.19</vulnerable>
bluez-utils are the utilities for use with the BlueZ
implementation of the Bluetooth wireless standards for Linux.
The name of a Bluetooth device is improperly validated by the hcid
utility when a remote device attempts to pair itself with a computer.
<impact type="high">
An attacker could create a malicious device name on a Bluetooth
device resulting in arbitrary commands being executed as root upon
attempting to pair the device with the computer.
There are no known workarounds at this time.
All bluez-utils users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-utils-2.19&quot;</code>
<uri link="">CAN-2005-2547</uri>
<uri link=";view=markup">bluez-utils ChangeLog</uri>
<metadata tag="requester" timestamp="Tue, 09 Aug 2005 20:35:32 +0000">
<metadata tag="submitter" timestamp="Wed, 10 Aug 2005 02:45:23 +0000">
<metadata tag="bugReady" timestamp="Wed, 17 Aug 2005 13:18:39 +0000">