Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-43400 CVE-2021-0129 |
CWE-ID | CWE-416 CWE-284 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
openEuler Operating systems & Components / Operating system bluez-help Operating systems & Components / Operating system package or component bluez-libs Operating systems & Components / Operating system package or component bluez-devel Operating systems & Components / Operating system package or component bluez-debugsource Operating systems & Components / Operating system package or component bluez-cups Operating systems & Components / Operating system package or component bluez-debuginfo Operating systems & Components / Operating system package or component bluez Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU83407
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43400
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in gatt-database.c on a gatt server if a client disconnects while a WriteValue call is being processed with D-Bus. An attacker with physical proximity to the system can trigger a use-after-free error and potentially execute arbitrary code.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
bluez-help: before 5.54-15
bluez-libs: before 5.54-15
bluez-devel: before 5.54-15
bluez-debugsource: before 5.54-15
bluez-cups: before 5.54-15
bluez-debuginfo: before 5.54-15
bluez: before 5.54-15
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2047
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54202
Risk: Low
CVSSv3.1: 5.6 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-0129
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote authenticated attacker on the local network can bypass implemented security restrictions and enable information disclosure
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
bluez-help: before 5.54-15
bluez-libs: before 5.54-15
bluez-devel: before 5.54-15
bluez-debugsource: before 5.54-15
bluez-cups: before 5.54-15
bluez-debuginfo: before 5.54-15
bluez: before 5.54-15
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2047
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.