Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA782] DSA-782-1 bluez-utils


Vulnerability Assessment Details

[DSA782] DSA-782-1 bluez-utils

Vulnerability Assessment Summary
DSA-782-1 bluez-utils

Detailed Explanation for this Vulnerability Assessment

Henryk Plötz discovered a vulnerability in bluez-utils, tools and
daemons for Bluetooth. Due to missing input sanitising it is possible
for a possible hacker to execute arbitrary commands supplied as device name
from the remote device.
The old stable distribution (woody) is not affected by this problem
since it doesn't contain bluez-utils packages.
For the stable distribution (sarge) this problem has been fixed in
version 2.15-1.1.
For the unstable distribution (sid) this problem has been fixed in
version 2.19-1.
We recommend that you upgrade your bluez-utils package.


Solution : http://www.debian.org/security/2005/dsa-782
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Vintage AMD AM486 DX4-100 CPU @ 100mhz - A80486DX4-100SV8B
$24.99
Vintage AMD AM486 DX4-100 CPU @ 100mhz - A80486DX4-100SV8B  pictureVintage Microsoft Windows 3.0 Graphical Environment OS User's Guide Manual
$3.99
Vintage Microsoft Windows 3.0 Graphical Environment OS User's Guide Manual pictureVintage IBM Think Pad Laptop Computer Type 2366 For Parts
$17.77
Vintage IBM Think Pad Laptop Computer Type 2366 For Parts  pictureHP Vectra VL 400.SF Vintage desktop computer
$399.0
HP Vectra VL 400.SF Vintage desktop computer picture


Discussions

No Discussions have been posted on this vulnerability.