Vulnerability in Bluez Bluetooth stack

In a free Bluetooth stack bluez, which is used in Linux and Chrome OS distributions, identified vulnerability (CVE-2020-0556), potentially allowing an attacker to gain access to the system. Vulnerability due to incorrect access checking in the implementation of Bluetooth HID and HOGP profiles Allows without going through the process of binding a device to a host, achieve a denial of service or privilege escalation when connecting a malicious Bluetooth device. A malicious Bluetooth device, without going through the pairing procedure, can impersonate another HID device (keyboard, mouse, game controllers, etc.) or organize hidden substitution of data in the input subsystem.

On According to At Intel, the problem appears in Bluez releases up to and including 5.52. It is not clear if the issue affects release 5.53, which not announced publicly, but since February available via Go and build archive. Fix patches (1, 2) the vulnerabilities were proposed on March 10, and the release 5.53 was formed on February 15th. In distribution kits, updates have not yet been formed (Debian, Ubuntu, SUSE, RHEL, Arch, Fedora).

Source: opennet.ru

Add a comment