Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-8921
HistoryNov 29, 2021 - 12:00 a.m.

CVE-2019-8921

2021-11-2900:00:00
ubuntu.com
ubuntu.com
15

3.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

40.3%

An issue was discovered in bluetoothd in BlueZ through 5.48. The
vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP
implementation. By crafting a malicious CSTATE, it is possible to trick the
server into returning more bytes than the buffer actually holds, resulting
in leaking arbitrary heap data. The root cause can be found in the function
service_attr_req of sdpd-request.c. The server does not check whether the
CSTATE data is the same in consecutive requests, and instead simply trusts
that it is the same.

Notes

Author Note
mdeslaur This was fixed in bionic by CVE-2021-41229-pre1.patch
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchbluez< 5.48-0ubuntu3.6UNKNOWN
ubuntu16.04noarchbluez< anyUNKNOWN

3.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

40.3%