All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/security/vulnerabilities/blueborne | not applicable |
https://www.armis.com/blueborne | third party advisory exploit technical description |
http://www.debian.org/security/2017/dsa-3972 | vendor advisory |
https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne | |
http://www.securityfocus.com/bid/100814 | third party advisory vdb entry |
http://nvidia.custhelp.com/app/answers/detail/a_id/4561 | |
https://www.kb.cert.org/vuls/id/240311 | third party advisory us government resource |
https://access.redhat.com/errata/RHSA-2017:2685 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2017-1000250 | issue tracking third party advisory vdb entry |