CVE-2016-7837

Published on: 06/09/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Bluez from Bluez contain the following vulnerability:

Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

  • CVE-2016-7837 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: BlueZ Project - BlueZ version 5.41 and earlier

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 4.6 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
JVN#38755305: BlueZ userland utilities vulnerable to buffer overflow Third Party Advisory
VDB Entry
jvn.jp
text/xml
URL Logo JVN JVN#38755305
bluez.git - Bluetooth protocol stack for Linux Patch
Third Party Advisory
git.kernel.org
text/html
URL Logo CONFIRM git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601
USN-4311-1: BlueZ vulnerabilities | Ubuntu security notices | Ubuntu usn.ubuntu.com
text/html
URL Logo UBUNTU USN-4311-1
BlueZ CVE-2016-7837 Local Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 95067

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationBluezBluezAllAllAllAll
  • cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*: