[ASA-202003-13] bluez: access restriction bypass
rgacogne at archlinux.org
Fri Mar 20 11:29:17 UTC 2020
Arch Linux Security Advisory ASA-202003-13
Date : 2020-03-19
CVE-ID : CVE-2020-0556
Package : bluez
Type : access restriction bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-1116
The package bluez before version 5.54-1 is vulnerable to access
Upgrade to 5.54-1.
# pacman -Syu "bluez>=5.54-1"
The problem has been fixed upstream in version 5.54.
It was discovered that the HID and HOGP profiles implementations in
bluez before 5.54 don't specifically require bonding between the device
and the host. This creates an opportunity for a malicious device to
connect to a target host to either impersonate an existing HID device
without security or to cause an SDP or GATT service discovery to take
place which would allow HID reports to be injected to the input
subsystem from a non-bonded source.
This potentially enables an unauthenticated attacker with adjacent
access to impersonate an existing HID device, cause a denial of service
or escalate privileges.
An unauthenticated attacker with adjacent access can impersonate an
existing HID device, or cause a denial of service.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security