Vulnerability Name: | CVE-2023-27349 (CCN-252668) | ||||||||||||||||
Assigned: | 2023-04-12 | ||||||||||||||||
Published: | 2023-04-12 | ||||||||||||||||
Updated: | 2023-04-12 | ||||||||||||||||
Summary: | BlueZ could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the handling of the AVRCP protocol. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-27349 Source: XF Type: UNKNOWN bluez-cve202327349-code-exec(252668) Source: CCN Type: bluez.git Web site avrcp: Fix crash while handling unsupported events Source: CCN Type: ZDI-23-386 BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability | ||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |