CVE-2008-2374

src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html Third Party Advisory
http://secunia.com/advisories/30957 Broken Link Vendor Advisory
http://secunia.com/advisories/31057 Broken Link
http://secunia.com/advisories/31833 Broken Link
http://secunia.com/advisories/32099 Broken Link
http://secunia.com/advisories/32279 Broken Link
http://secunia.com/advisories/34280 Broken Link
http://security.gentoo.org/glsa/glsa-200903-29.xml Third Party Advisory
http://sourceforge.net/mailarchive/message.php?msg_name=b32d44000806161327u680c290au54fd21f2fef1d58e%40mail.gmail.com Broken Link Exploit
http://www.bluez.org/bluez-334/ Product
http://www.mandriva.com/security/advisories?name=MDVSA-2008:145 Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0581.html Broken Link
http://www.securityfocus.com/bid/30105 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020479 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2096/references Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9973 Broken Link
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00233.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html Third Party Advisory
http://secunia.com/advisories/30957 Broken Link Vendor Advisory
http://secunia.com/advisories/31057 Broken Link
http://secunia.com/advisories/31833 Broken Link
http://secunia.com/advisories/32099 Broken Link
http://secunia.com/advisories/32279 Broken Link
http://secunia.com/advisories/34280 Broken Link
http://security.gentoo.org/glsa/glsa-200903-29.xml Third Party Advisory
http://sourceforge.net/mailarchive/message.php?msg_name=b32d44000806161327u680c290au54fd21f2fef1d58e%40mail.gmail.com Broken Link Exploit
http://www.bluez.org/bluez-334/ Product
http://www.mandriva.com/security/advisories?name=MDVSA-2008:145 Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0581.html Broken Link
http://www.securityfocus.com/bid/30105 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020479 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2096/references Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9973 Broken Link
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00233.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bluez:bluez-libs:*:*:*:*:*:*:*:*
cpe:2.3:a:bluez:bluez-utils:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

History

17 Jan 2025, 16:15

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8

Information

Published : 2008-07-07 23:41

Updated : 2025-04-09 00:30


NVD link : CVE-2008-2374

Mitre link : CVE-2008-2374

CVE.ORG link : CVE-2008-2374


JSON object : View

Products Affected

fedoraproject

  • fedora

bluez

  • bluez-utils
  • bluez-libs
CWE
CWE-1284

Improper Validation of Specified Quantity in Input