CNNVD-ID编号 | CNNVD-202010-613 |
CVE编号 | CVE-2020-12351 |
发布时间 | 2020-10-14 |
更新时间 | 2020-12-02 |
漏洞类型 | 输入验证错误 |
漏洞来源 | N/A |
危险等级 | 高危 |
威胁类型 | 远程或本地 |
厂 商 | N/A |
BlueZ是一款使用C语言编写的蓝牙协议堆栈,它主要用于提供对核心蓝牙层和协议的支持。
Linux内核蓝牙存在安全漏洞,该漏洞源于实现使用A2MP CID处理L2CAP数据包的方式。攻击者可利用这个漏洞使系统崩溃,从而导致拒绝服务,或者通过发送一个特制的L2CAP包潜在地在系统上执行任意代码。
目前厂商已发布升级了BlueZ 输入验证错误漏洞的补丁,BlueZ 输入验证错误漏洞的补丁获取链接:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html
来源:MISC
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-memory-corruption-via-Bluetooth-L2CAP-33606
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159644/Red-Hat-Security-Advisory-2020-4276-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159702/Kernel-Live-Patch-Security-Notice-LSN-0073-1.html
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:access.redhat.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
暂无