vulnerability
Ubuntu: USN-7222-1 (CVE-2023-50230): BlueZ vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:A/AC:M/Au:N/C:C/I:C/A:C) | May 3, 2024 | Jan 23, 2025 | Mar 27, 2026 |
Description
BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.
The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.
Solutions
References
- CVE-2023-50230
- https://attackerkb.com/topics/CVE-2023-50230
- CWE-122
- EUVD-EUVD-2023-55052
- UBUNTU-USN-7222-1
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-55052
- https://ubuntu.com/security/notices/USN-7222-1
- https://www.cve.org/CVERecord?id=CVE-2023-50230
- https://www.zerodayinitiative.com/advisories/ZDI-23-1812/
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.