CVE-2017-1000250

Published: 12 September 2017

All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.

From the Ubuntu security team

It was discovered that an information disclosure vulnerability existed in the Service Discovery Protocol (SDP) implementation in BlueZ. A physically proximate unauthenticated attacker could use this to disclose sensitive information.

Priority

High

CVSS 3 base score: 6.5

Status

Package Release Status
bluez
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 LTS (Xenial Xerus)
Released (5.37-0ubuntu5.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.101-0ubuntu13.3])
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=9e009647b14e810e06626dde7f1bb9ea3c375d09