CVE-2016-9804 PUBLISHED

In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

EPSS 0.36% · 57.9th percentile

Risk Scores

EPSS Score
0.36%
57.9th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSbluez5.64-0ubuntu1.1, 5.64-0ubuntu1.3, 5.64-0ubuntu1.4
Ubuntu:Pro:18.04:LTSbluez5.48-0ubuntu3.9+esm2, 5.48-0ubuntu3.2, 5.48-0ubuntu3.3
Ubuntu:24.04:LTSbluez5.71-0ubuntu3, 5.72-0ubuntu5.5, 5.72-0ubuntu5.4
Ubuntu:20.04:LTSbluez5.53-0ubuntu3.4, 0, 5.50-0ubuntu4
Ubuntu:25.10bluez0, 5.79-2ubuntu1, 5.82-1
Ubuntu:Pro:16.04:LTSbluez5.37-0ubuntu5.3, 5.37-0ubuntu5.1, 0

Timeline

References

Open in Interactive Console →