hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf | |
http://osvdb.org/32830 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2007-0065.html | vendor advisory |
http://www.securityfocus.com/archive/1/455889/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2007/0200 | vdb entry |
http://secunia.com/advisories/23798 | third party advisory |
http://www.securityfocus.com/bid/22076 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10208 | signature vdb entry |
http://mulliner.org/bluetooth/hidattack.php | |
http://secunia.com/advisories/23879 | third party advisory |
http://www.ubuntu.com/usn/usn-413-1 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:014 | vendor advisory |
http://secunia.com/advisories/25264 | third party advisory |
http://secunia.com/advisories/23747 | third party advisory |