Executive Summary

Informations
Name CVE-2008-2374 First vendor Publication 2008-07-07
Vendor Cve Last vendor Modification 2024-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic
CAPEC-72 URL Encoding
CAPEC-73 User-Controlled Filename
CAPEC-78 Using Escaped Slashes in Alternate Encoding
CAPEC-79 Using Slashes in Alternate Encoding
CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic
CAPEC-81 Web Logs Tampering
CAPEC-83 XPath Injection
CAPEC-85 Client Network Footprinting (using AJAX/XSS)
CAPEC-86 Embedding Script (XSS ) in HTTP Headers
CAPEC-88 OS Command Injection
CAPEC-91 XSS in IMG Tags
CAPEC-99 XML Parser Attack
CAPEC-101 Server Side Include (SSI) Injection
CAPEC-104 Cross Zone Scripting
CAPEC-106 Cross Site Scripting through Log Files
CAPEC-108 Command Line Execution through SQL Injection
CAPEC-109 Object Relational Mapping Injection
CAPEC-110 SQL Injection through SOAP Parameter Tampering
CAPEC-171 Variable Manipulation

CWE : Common Weakness Enumeration

% Id Name

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22630
 
Oval ID: oval:org.mitre.oval:def:22630
Title: ELSA-2008:0581: bluez-libs and bluez-utils security update (Moderate)
Description: src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
Family: unix Class: patch
Reference(s): ELSA-2008:0581-01
CVE-2008-2374
Version: 6
Platform(s): Oracle Linux 5
Product(s): bluez-libs
bluez-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29255
 
Oval ID: oval:org.mitre.oval:def:29255
Title: RHSA-2008:0581 -- bluez-libs and bluez-utils security update (Moderate)
Description: Updated bluez-libs and bluez-utils packages that fix a security flaw are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The bluez-libs package contains libraries for use in Bluetooth applications. The bluez-utils package contains Bluetooth daemons and utilities. An input validation flaw was found in the Bluetooth Session Description Protocol (SDP) packet parser used by the Bluez Bluetooth utilities. A Bluetooth device with an already-established trust relationship, or a local user registering a service record via a UNIX reg; socket or D-Bus interface, could cause a crash, or possibly execute arbitrary code with privileges of the hcid daemon. (CVE-2008-2374) Users of bluez-libs and bluez-utils are advised to upgrade to these updated packages, which contains a backported patch to correct this issue.
Family: unix Class: patch
Reference(s): RHSA-2008:0581
CESA-2008:0581-CentOS 5
CVE-2008-2374
Version: 3
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 4
CentOS Linux 5
Product(s): bluez-libs
bluez-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9973
 
Oval ID: oval:org.mitre.oval:def:9973
Title: src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
Description: src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
Family: unix Class: vulnerability
Reference(s): CVE-2008-2374
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Os 2

OpenVAS Exploits

Date Description
2009-04-09 Name : Mandriva Update for bluez MDVSA-2008:145 (bluez)
File : nvt/gb_mandriva_MDVSA_2008_145.nasl
2009-03-20 Name : Gentoo Security Advisory GLSA 200903-29 (bluez-utils bluez-libs)
File : nvt/glsa_200903_29.nasl
2009-03-06 Name : RedHat Update for bluez-libs and bluez-utils RHSA-2008:0581-01
File : nvt/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl
2009-02-17 Name : Fedora Update for bluez-libs FEDORA-2008-6133
File : nvt/gb_fedora_2008_6133_bluez-libs_fc9.nasl
2009-02-17 Name : Fedora Update for bluez-utils FEDORA-2008-6133
File : nvt/gb_fedora_2008_6133_bluez-utils_fc9.nasl
2009-02-17 Name : Fedora Update for bluez-libs FEDORA-2008-6140
File : nvt/gb_fedora_2008_6140_bluez-libs_fc8.nasl
2009-02-17 Name : Fedora Update for bluez-utils FEDORA-2008-6140
File : nvt/gb_fedora_2008_6140_bluez-utils_fc8.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
46757 BlueZ bluez-libs src/sdp.c SDP Packet Processing Remote DOS

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2008-0581.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20080714_bluez_libs_and_bluez_utils_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2008-0581.nasl - Type : ACT_GATHER_INFO
2009-07-21 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_bluez-audio-080716.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2008-145.nasl - Type : ACT_GATHER_INFO
2009-03-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200903-29.nasl - Type : ACT_GATHER_INFO
2008-10-16 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2008-6140.nasl - Type : ACT_GATHER_INFO
2008-09-25 Name : The remote openSUSE host is missing a security update.
File : suse_bluez-audio-5441.nasl - Type : ACT_GATHER_INFO
2008-09-24 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_bluez-cups-5437.nasl - Type : ACT_GATHER_INFO
2008-09-10 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2008-6133.nasl - Type : ACT_GATHER_INFO
2008-07-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0581.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/30105
CONFIRM http://www.bluez.org/bluez-334/
FEDORA https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396...
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg002...
GENTOO http://security.gentoo.org/glsa/glsa-200903-29.xml
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2008:145
MLIST http://sourceforge.net/mailarchive/message.php?msg_name=b32d44000806161327u68...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2008-0581.html
SECTRACK http://www.securitytracker.com/id?1020479
SECUNIA http://secunia.com/advisories/30957
http://secunia.com/advisories/31057
http://secunia.com/advisories/31833
http://secunia.com/advisories/32099
http://secunia.com/advisories/32279
http://secunia.com/advisories/34280
SUSE http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
VUPEN http://www.vupen.com/english/advisories/2008/2096/references

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-02-13 21:27:56
  • Multiple Updates
2021-04-22 01:07:56
  • Multiple Updates
2020-05-23 01:39:30
  • Multiple Updates
2020-05-23 00:21:44
  • Multiple Updates
2017-09-29 09:23:33
  • Multiple Updates
2016-04-26 17:25:42
  • Multiple Updates
2014-02-17 10:45:07
  • Multiple Updates
2013-05-11 00:17:47
  • Multiple Updates
2012-11-27 13:28:10
  • Multiple Updates