ArchLinux: 202003-13: bluez: access restriction bypass

    Date20 Mar 2020
    133
    Posted ByLinuxSecurity Advisories
    The package bluez before version 5.54-1 is vulnerable to access restriction bypass.
    Arch Linux Security Advisory ASA-202003-13
    ==========================================
    
    Severity: High
    Date    : 2020-03-19
    CVE-ID  : CVE-2020-0556
    Package : bluez
    Type    : access restriction bypass
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1116
    
    Summary
    =======
    
    The package bluez before version 5.54-1 is vulnerable to access
    restriction bypass.
    
    Resolution
    ==========
    
    Upgrade to 5.54-1.
    
    # pacman -Syu "bluez>=5.54-1"
    
    The problem has been fixed upstream in version 5.54.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    It was discovered that the HID and HOGP profiles implementations in
    bluez before 5.54 don't specifically require bonding between the device
    and the host. This creates an opportunity for a malicious device to
    connect to a target host to either impersonate an existing HID device
    without security or to cause an SDP or GATT service discovery to take
    place which would allow HID reports to be injected to the input
    subsystem from a non-bonded source.
    This potentially enables an unauthenticated attacker with adjacent
    access to impersonate an existing HID device, cause a denial of service
    or escalate privileges.
    
    Impact
    ======
    
    An unauthenticated attacker with adjacent access can impersonate an
    existing HID device, or cause a denial of service.
    
    References
    ==========
    
    https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
    https://www.openwall.com/lists/oss-security/2020/03/12/4
    https://lore.kernel.org/linux-bluetooth/This email address is being protected from spambots. You need JavaScript enabled to view it./
    https://patchwork.kernel.org/patch/11428317/
    https://patchwork.kernel.org/patch/11428319/
    https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8cdbd3b09f29da29374e2f83369df24228da0ad1
    https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3cccdbab2324086588df4ccf5f892fb3ce1f1787
    https://security.archlinux.org/CVE-2020-0556
    
    

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"48","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"4","type":"x","order":"2","pct":7.41,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"2","type":"x","order":"3","pct":3.7,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.