CVE-2017-1000250
Published: 12 September 2017
All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
From the Ubuntu Security Team
It was discovered that an information disclosure vulnerability existed in the Service Discovery Protocol (SDP) implementation in BlueZ. A physically proximate unauthenticated attacker could use this to disclose sensitive information.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
bluez Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was released [4.101-0ubuntu13.3])
|
|
xenial |
Released
(5.37-0ubuntu5.1)
|
|
zesty |
Released
(5.43-0ubuntu1.1)
|
|
Patches: upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=9e009647b14e810e06626dde7f1bb9ea3c375d09 |