CNNVD-ID编号 | CNNVD-202003-798 |
CVE编号 | CVE-2020-0556 |
发布时间 | 2020-03-12 |
更新时间 | 2020-11-27 |
漏洞类型 | 访问控制错误 |
漏洞来源 | Ubuntu,Red Hat,Gentoo |
危险等级 | 高危 |
威胁类型 | 远程或本地 |
厂 商 | N/A |
BlueZ是一款使用C语言编写的蓝牙协议堆栈,它主要用于提供对核心蓝牙层和协议的支持。
BlueZ 5.54之前版本中的子系统存在访问控制错误漏洞。攻击者可利用该漏洞提升权限或导致拒绝服务。
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
http://www.bluez.org/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html
来源:DEBIAN
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html
来源:CONFIRM
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
来源:GENTOO
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00008.html
来源:UBUNTU
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156912/Gentoo-Linux-Security-Advisory-202003-49.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159390/Red-Hat-Security-Advisory-2020-4001-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159821/Red-Hat-Security-Advisory-2020-4481-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/BlueZ-privilege-escalation-via-Subsystem-Access-Control-31889
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156975/Ubuntu-Security-Notice-USN-4311-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
暂无