Executive Summary

Summary
TitleBlueZ: Security bypass
Informations
NameGLSA-202003-49First vendor Publication2020-03-25
VendorGentooLast vendor Modification2020-03-25
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability in BlueZ might allow remote attackers to bypass security restrictions.

Background

Set of tools to manage Bluetooth devices for Linux.

Description

It was discovered that the HID and HOGP profiles implementations in BlueZ did not specifically require bonding between the device and the host.

Impact

A remote attacker with adjacent access could impersonate an existing HID device, cause a Denial of Service condition or escalate privileges.

Workaround

There is no known workaround at this time.

Resolution

All BlueZ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.54"

References

[ 1 ] CVE-2020-0556 : https://nvd.nist.gov/vuln/detail/CVE-2020-0556

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202003-49

Original Source

Url : http://security.gentoo.org/glsa/glsa-202003-49.xml

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-03-25 17:18:57
  • First insertion