8.3
CVSSv2

CVE-2017-1000251

Published: 12/09/2017 Updated: 17/02/2018
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 840
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

Vulnerability Trend

Affected Products

Vendor Product Versions
DebianDebian Linux8.0, 9.0
LinuxLinux Kernel2.6.32, 2.6.32.1, 2.6.32.2, 2.6.32.3, 2.6.32.4, 2.6.32.5, 2.6.32.6, 2.6.32.7, 2.6.32.8, 2.6.32.9, 2.6.32.10, 2.6.32.11, 2.6.32.12, 2.6.32.13, 2.6.32.14, 2.6.32.15, 2.6.32.16, 2.6.32.17, 2.6.32.18, 2.6.32.19, 2.6.32.20, 2.6.32.21, 2.6.32.22, 2.6.32.23, 2.6.32.24, 2.6.32.25, 2.6.32.26, 2.6.32.27, 2.6.32.28, 2.6.32.29, 2.6.32.30, 2.6.32.31, 2.6.32.32, 2.6.32.33, 2.6.32.34, 2.6.32.35, 2.6.32.36, 2.6.32.37, 2.6.32.38, 2.6.32.39, 2.6.32.40, 2.6.32.41, 2.6.32.42, 2.6.32.43, 2.6.32.44, 2.6.32.45, 2.6.32.46, 2.6.32.47, 2.6.32.48, 2.6.32.49, 2.6.32.50, 2.6.32.51, 2.6.32.52, 2.6.32.53, 2.6.32.54, 2.6.32.55, 2.6.32.56, 2.6.32.57, 2.6.32.58, 2.6.33, 2.6.33.1, 2.6.33.2, 2.6.33.3, 2.6.33.4, 2.6.33.5, 2.6.33.6, 2.6.33.7, 2.6.33.8, 2.6.33.9, 2.6.33.10, 2.6.33.11, 2.6.33.12, 2.6.33.13, 2.6.33.14, 2.6.33.15, 2.6.33.16, 2.6.33.17, 2.6.33.18, 2.6.33.19, 2.6.33.20, 2.6.34, 2.6.34.1, 2.6.34.2, 2.6.34.3, 2.6.34.4, 2.6.34.5, 2.6.34.6, 2.6.34.7, 2.6.34.8, 2.6.34.9, 2.6.34.10, 2.6.35, 2.6.35.1, 2.6.35.2, 2.6.35.3, 2.6.35.4, 2.6.35.5, 2.6.35.6, 2.6.35.7, 2.6.35.8, 2.6.35.9, 2.6.35.10, 2.6.35.11, 2.6.35.12, 2.6.35.13, 2.6.36, 2.6.36.1, 2.6.36.2, 2.6.36.3, 2.6.36.4, 2.6.37, 2.6.37.1, 2.6.37.2, 2.6.37.3, 2.6.37.4, 2.6.37.5, 2.6.37.6, 2.6.38, 2.6.38.1, 2.6.38.2, 2.6.38.3, 2.6.38.4, 2.6.38.5, 2.6.38.6, 2.6.38.7, 2.6.38.8, 2.6.39, 2.6.39.1, 2.6.39.2, 2.6.39.3, 2.6.39.4, 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 3.0.19, 3.0.20, 3.0.21, 3.0.22, 3.0.23, 3.0.24, 3.0.25, 3.0.26, 3.0.27, 3.0.28, 3.0.29, 3.0.30, 3.0.31, 3.0.32, 3.0.33, 3.0.34, 3.0.35, 3.0.36, 3.0.37, 3.0.38, 3.0.39, 3.0.40, 3.0.41, 3.0.42, 3.0.43, 3.0.44, 3.0.45, 3.0.46, 3.0.47, 3.0.48, 3.0.49, 3.0.50, 3.0.51, 3.0.52, 3.0.53, 3.0.54, 3.0.55, 3.0.56, 3.0.57, 3.0.58, 3.0.59, 3.0.60, 3.0.61, 3.0.62, 3.0.63, 3.0.64, 3.0.65, 3.0.66, 3.0.67, 3.0.68, 3.0.69, 3.0.70, 3.0.71, 3.0.72, 3.0.73, 3.0.74, 3.0.75, 3.0.76, 3.0.77, 3.0.78, 3.0.79, 3.0.80, 3.0.81, 3.0.82, 3.0.83, 3.0.84, 3.0.85, 3.0.86, 3.0.87, 3.0.88, 3.0.89, 3.0.90, 3.0.91, 3.0.92, 3.0.93, 3.0.94, 3.0.95, 3.0.96, 3.0.97, 3.0.98, 3.0.99, 3.0.100, 3.0.101, 3.1, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.2, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.2.10, 3.2.11, 3.2.12, 3.2.13, 3.2.14, 3.2.15, 3.2.16, 3.2.17, 3.2.18, 3.2.19, 3.2.20, 3.2.21, 3.2.22, 3.2.23, 3.2.24, 3.2.25, 3.2.26, 3.2.27, 3.2.28, 3.2.29, 3.2.30, 3.2.64, 3.2.65, 3.2.66, 3.2.67, 3.2.68, 3.2.69, 3.2.70, 3.2.71, 3.2.72, 3.2.73, 3.2.74, 3.2.75, 3.2.76, 3.2.77, 3.2.78, 3.2.79, 3.2.80, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.4, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.7, 3.4.8, 3.4.9, 3.4.10, 3.4.11, 3.4.12, 3.4.13, 3.4.14, 3.4.15, 3.4.16, 3.4.17, 3.4.18, 3.4.19, 3.4.20, 3.4.21, 3.4.22, 3.4.23, 3.4.24, 3.4.25, 3.4.26, 3.4.27, 3.4.28, 3.4.29, 3.4.30, 3.4.31, 3.4.32, 3.4.33, 3.4.34, 3.4.35, 3.4.36, 3.4.37, 3.4.38, 3.4.39, 3.4.40, 3.4.41, 3.4.42, 3.4.43, 3.4.44, 3.4.45, 3.4.46, 3.4.47, 3.4.48, 3.4.49, 3.4.50, 3.4.51, 3.4.52, 3.4.53, 3.4.54, 3.4.55, 3.4.56, 3.4.57, 3.4.58, 3.4.59, 3.4.60, 3.4.61, 3.4.62, 3.4.63, 3.4.64, 3.4.65, 3.4.66, 3.4.67, 3.4.68, 3.4.69, 3.4.70, 3.4.71, 3.4.72, 3.4.73, 3.4.74, 3.4.75, 3.4.76, 3.4.77, 3.4.78, 3.4.79, 3.4.80, 3.4.81, 3.4.82, 3.4.83, 3.4.84, 3.4.85, 3.4.86, 3.4.87, 3.4.88, 3.4.89, 3.4.90, 3.4.91, 3.4.92, 3.4.93, 3.4.94, 3.4.95, 3.4.96, 3.4.97, 3.4.98, 3.4.99, 3.4.100, 3.4.101, 3.4.102, 3.4.103, 3.4.104, 3.4.105, 3.4.106, 3.4.107, 3.4.108, 3.4.109, 3.4.110, 3.4.111, 3.4.112, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.5.5, 3.5.6, 3.5.7, 3.6, 3.6.1, 3.6.2, 3.6.3, 3.6.4, 3.6.5, 3.6.6, 3.6.7, 3.6.8, 3.6.9, 3.6.10, 3.6.11, 3.7, 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.7.5, 3.7.6, 3.7.7, 3.7.8, 3.7.9, 3.7.10, 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9, 3.8.10, 3.8.11, 3.8.12, 3.8.13, 3.9, 3.9.0, 3.9.1, 3.9.2, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 3.9.8, 3.9.9, 3.9.10, 3.9.11, 3.10, 3.10.1, 3.10.2, 3.10.3, 3.10.4, 3.10.5, 3.10.6, 3.10.7, 3.10.8, 3.10.9, 3.10.10, 3.10.11, 3.10.12, 3.10.13, 3.10.14, 3.10.15, 3.10.16, 3.10.17, 3.10.18, 3.10.19, 3.10.20, 3.10.21, 3.10.22, 3.10.23, 3.10.24, 3.10.25, 3.10.26, 3.10.27, 3.10.28, 3.10.29, 3.10.30, 3.10.31, 3.10.32, 3.10.33, 3.10.34, 3.10.35, 3.10.36, 3.10.37, 3.10.38, 3.10.39, 3.10.40, 3.10.41, 3.10.42, 3.10.43, 3.10.44, 3.10.45, 3.10.46, 3.10.47, 3.10.48, 3.10.49, 3.10.50, 3.10.51, 3.10.52, 3.10.53, 3.10.54, 3.10.55, 3.10.56, 3.10.57, 3.10.58, 3.10.59, 3.10.60, 3.10.61, 3.10.62, 3.10.63, 3.10.64, 3.10.65, 3.10.66, 3.10.67, 3.10.68, 3.10.69, 3.10.70, 3.10.71, 3.10.72, 3.10.73, 3.10.74, 3.10.75, 3.10.76, 3.10.77, 3.10.78, 3.10.79, 3.10.80, 3.10.81, 3.10.82, 3.10.83, 3.10.84, 3.10.85, 3.10.86, 3.10.87, 3.10.88, 3.10.89, 3.10.90, 3.10.91, 3.10.92, 3.10.93, 3.10.94, 3.10.95, 3.10.96, 3.10.97, 3.10.98, 3.10.99, 3.10.100, 3.10.101, 3.10.102, 3.11, 3.11.1, 3.11.2, 3.11.3, 3.11.4, 3.11.5, 3.11.6, 3.11.7, 3.11.8, 3.11.9, 3.11.10, 3.12, 3.12.1, 3.12.2, 3.12.3, 3.12.4, 3.12.5, 3.12.6, 3.12.7, 3.12.8, 3.12.9, 3.12.10, 3.12.11, 3.12.12, 3.12.13, 3.12.14, 3.12.15, 3.12.16, 3.12.17, 3.12.18, 3.12.19, 3.12.20, 3.12.21, 3.12.22, 3.12.23, 3.12.24, 3.12.25, 3.12.26, 3.12.27, 3.12.28, 3.12.29, 3.12.30, 3.12.31, 3.12.32, 3.12.33, 3.12.34, 3.12.35, 3.12.36, 3.12.37, 3.12.38, 3.12.39, 3.12.40, 3.12.41, 3.12.42, 3.12.43, 3.12.44, 3.12.45, 3.12.46, 3.12.47, 3.12.48, 3.12.49, 3.12.50, 3.12.51, 3.12.52, 3.12.53, 3.12.54, 3.12.55, 3.12.56, 3.12.57, 3.12.58, 3.12.59, 3.13, 3.13.1, 3.13.2, 3.13.3, 3.13.4, 3.13.5, 3.13.6, 3.13.7, 3.13.8, 3.13.9, 3.13.10, 3.13.11, 3.14, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.5, 3.14.10, 3.14.11, 3.14.12, 3.14.13, 3.14.14, 3.14.15, 3.14.16, 3.14.17, 3.14.18, 3.14.19, 3.14.20, 3.14.21, 3.14.22, 3.14.23, 3.14.24, 3.14.25, 3.14.26, 3.14.27, 3.14.28, 3.14.29, 3.14.30, 3.14.31, 3.14.32, 3.14.33, 3.14.34, 3.14.35, 3.14.36, 3.14.37, 3.14.38, 3.14.39, 3.14.40, 3.14.41, 3.14.42, 3.14.43, 3.14.44, 3.14.45, 3.14.46, 3.14.47, 3.14.48, 3.14.49, 3.14.50, 3.14.51, 3.14.52, 3.14.53, 3.14.54, 3.14.55, 3.14.56, 3.14.57, 3.14.58, 3.14.59, 3.14.60, 3.14.61, 3.14.62, 3.14.63, 3.14.64, 3.14.65, 3.14.66, 3.14.67, 3.14.68, 3.14.79, 3.15, 3.15.1, 3.15.2, 3.15.3, 3.15.4, 3.15.5, 3.15.6, 3.15.7, 3.15.8, 3.15.10, 3.16.0, 3.16.1, 3.16.4, 3.16.5, 3.16.6, 3.16.7, 3.17.5, 3.17.6, 3.17.7, 3.17.8, 3.18.0, 3.18.1, 3.18.2, 3.18.3, 3.18.4, 3.18.5, 3.18.6, 3.18.7, 3.18.8, 3.18.10, 3.18.11, 3.18.12, 3.18.13, 3.18.14, 3.18.15, 3.18.16, 3.18.17, 3.18.18, 3.18.19, 3.18.20, 3.18.21, 3.18.22, 3.18.23, 3.18.24, 3.18.25, 3.18.26, 3.18.27, 3.18.28, 3.18.29, 3.18.30, 3.18.31, 3.18.32, 3.18.33, 3.18.34, 3.18.35, 3.18.36, 3.18.37, 3.18.38, 3.18.39, 3.18.40, 3.18.41, 3.18.42, 3.18.43, 3.18.44, 3.18.45, 3.18.46, 3.18.47, 3.18.48, 3.18.49, 3.18.50, 3.18.51, 3.18.52, 3.18.53, 3.18.54, 3.18.55, 3.18.56, 3.18.57, 3.18.58, 3.18.59, 3.18.60, 3.18.61, 3.18.62, 3.18.63, 3.18.64, 3.18.65, 3.18.66, 3.19, 3.19.1, 3.19.2, 3.19.3, 3.19.4, 3.19.5, 3.19.6, 3.19.7, 3.19.8, 4.0, 4.0.0, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.0.9, 4.1.0, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.1.7, 4.1.8, 4.1.9, 4.1.10, 4.1.11, 4.1.12, 4.1.13, 4.1.14, 4.1.15, 4.1.16, 4.1.17, 4.1.18, 4.1.19, 4.1.20, 4.1.21, 4.1.22, 4.1.23, 4.1.33, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.2.8, 4.3, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.5, 4.3.6, 4.4, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.10, 4.4.11, 4.4.12, 4.4.13, 4.4.14, 4.4.15, 4.4.16, 4.4.17, 4.4.18, 4.4.19, 4.4.20, 4.4.21, 4.4.22, 4.4.23, 4.4.24, 4.4.25, 4.4.26, 4.4.27, 4.4.28, 4.4.29, 4.4.30, 4.4.31, 4.4.32, 4.4.33, 4.4.34, 4.4.35, 4.4.36, 4.4.37, 4.4.38, 4.4.39, 4.4.40, 4.4.41, 4.4.42, 4.4.43, 4.4.44, 4.4.45, 4.4.46, 4.4.47, 4.4.48, 4.4.49, 4.4.50, 4.4.51, 4.4.52, 4.4.53, 4.4.54, 4.4.55, 4.4.56, 4.4.57, 4.4.58, 4.4.59, 4.4.60, 4.4.61, 4.4.62, 4.4.63, 4.4.64, 4.4.65, 4.4.66, 4.4.67, 4.4.68, 4.4.69, 4.4.70, 4.4.71, 4.4.72, 4.4.73, 4.4.74, 4.4.75, 4.4.76, 4.4.77, 4.4.78, 4.4.79, 4.4.80, 4.4.81, 4.4.82, 4.4.83, 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, 4.5.7, 4.6, 4.6.1, 4.6.2, 4.6.3, 4.6.4, 4.6.5, 4.6.6, 4.6.7, 4.7, 4.7.3, 4.7.4, 4.7.6, 4.7.9, 4.8, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 4.8.5, 4.8.6, 4.8.7, 4.8.8, 4.8.9, 4.8.10, 4.8.11, 4.8.12, 4.8.13, 4.8.14, 4.8.15, 4.8.16, 4.8.17, 4.9, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.9.7, 4.9.8, 4.9.9, 4.9.10, 4.9.11, 4.9.12, 4.9.13, 4.9.14, 4.9.15, 4.9.16, 4.9.17, 4.9.18, 4.9.19, 4.9.20, 4.9.21, 4.9.22, 4.9.23, 4.9.24, 4.9.25, 4.9.26, 4.9.27, 4.9.28, 4.9.29, 4.9.30, 4.9.31, 4.9.32, 4.9.33, 4.9.34, 4.9.35, 4.9.36, 4.9.37, 4.9.38, 4.9.39, 4.9.40, 4.9.41, 4.9.42, 4.9.43, 4.9.44, 4.10, 4.10.1, 4.10.2, 4.10.3, 4.10.4, 4.10.5, 4.10.6, 4.10.7, 4.10.8, 4.10.9, 4.10.10, 4.10.11, 4.10.12, 4.10.13, 4.10.14, 4.10.15, 4.11, 4.11.1, 4.11.2, 4.11.3, 4.11.4, 4.11.5, 4.11.6, 4.11.7, 4.11.8, 4.11.9, 4.11.10, 4.11.11, 4.11.12, 4.12, 4.12.1, 4.12.2, 4.12.3, 4.12.4, 4.12.5, 4.12.6, 4.12.7, 4.12.8, 4.12.9, 4.12.10, 4.12.11, 4.12.12, 4.12.13, 4.12.14, 4.13, 4.13.1

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 62 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
The system could be made to crash if it received specially crafted bluetooth traffic ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticated attacke ...
Arch Linux Security Advisory ASA-201709-4 ========================================= Severity: High Date : 2017-09-13 CVE-ID : CVE-2017-1000251 Package : linux-hardened Type : arbitrary code execution Remote : Yes Link : securityarchlinuxorg/AVG-395 Summary ======= The package linux-hardened before version 4131b-1 is vulne ...
Arch Linux Security Advisory ASA-201709-12 ========================================== Severity: High Date : 2017-09-18 CVE-ID : CVE-2017-1000251 Package : linux-zen Type : arbitrary code execution Remote : Yes Link : securityarchlinuxorg/AVG-394 Summary ======= The package linux-zen before version 4132-1 is vulnerable to a ...
Arch Linux Security Advisory ASA-201709-8 ========================================= Severity: High Date : 2017-09-14 CVE-ID : CVE-2017-1000251 Package : linux-lts Type : arbitrary code execution Remote : Yes Link : securityarchlinuxorg/AVG-393 Summary ======= The package linux-lts before version 4949-2 is vulnerable to arb ...
Arch Linux Security Advisory ASA-201709-9 ========================================= Severity: High Date : 2017-09-15 CVE-ID : CVE-2017-1000251 Package : linux Type : arbitrary code execution Remote : Yes Link : securityarchlinuxorg/AVG-392 Summary ======= The package linux before version 41213-1 is vulnerable to arbitrary ...
A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures), an unauthenticated attacker able to initiate a connection ...
stack buffer overflow in the native Bluetooth stackA stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other th ...
Summary A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticat ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Debian Bug report logs - #875881 linux: CVE-2017-1000251 Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: Christoph Anton Mitterer <calestyo@scientianet> Date: Fri, 15 Sep 2017 14:42:01 UTC Severity: critical Tags: confirmed, fixed-upstream, security, ...
Symantec Network Protection products that include a vulnerable version of the Linux kernel are susceptible to multiple vulnerabilities  A remote attacker, with access to the management interface, can obtain unauthorized read/write access to local files, cause denial of service, and possible execute arbitrary code ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to privilege escalation, denial of service or information leaks CVE-2017-7518 Andy Lutomirski discovered that KVM is prone to an incorrect debug exception (#DB) error occurring while emulating a syscall instruction A process inside a guest can take advanta ...
Oracle Linux Bulletin - July 2017 Description The Oracle Linux Bulletin lists all CVEs that had been resolved and announced in Oracle Linux Security Advisories (ELSA) in the last one month prior to the release of the bulletin Oracle Linux Bulletins are published on the same day as Oracle Critical Patch Updates are released ...
Oracle VM Server for x86 Bulletin - October 2017 Description The Oracle VM Server for x86 Bulletin lists all CVEs that had been resolved and announced in Oracle VM Server for x86 Security Advisories (OVMSA) in the last one month prior to the release of the bulletin Oracle VM Server for x86 Bulletins are pub ...
Oracle Linux Bulletin - October 2017 Description The Oracle Linux Bulletin lists all CVEs that had been resolved and announced in Oracle Linux Security Advisories (ELSA) in the last one month prior to the release of the bulletin Oracle Linux Bulletins are published on the same day as Oracle Critical ...

Exploits

# Exploit Title: BlueBorne - Proof of Concept - Unarmed/Unweaponized - DoS (Crash) only # Date: 09/21/2017 # Exploit Author: Marcin Kozlowski <marcinguy@gmailcom> # Version: Kernel version v33-rc1, and thus affects all version from there on # Tested on: Linux 440-93-generic #116 # CVE : CVE-2017-1000251 # Provided for legal security rese ...

Github Repositories

blueborne It is a PoC of the BlueBorne exploit

blueborne-CVE-2017-1000251-POC Just cloned GitLab repo All credit goes to: marcinguy For educational and testing purposes only It is not armed with payload, only Proof of Concept, to show it is possible

Blueborne A simple bluetooth DoS using the blueborne exploit (CVE-2017-1000251) For instructions :- cnhvco/1dr5

blueborne-CVE-2017-1000251 gitlabcom/marcinguy/blueborne-CVE-2017-1000251

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) c

This is the repository of the distribution specific Yocto layer for the Stromer Medusa hardware Modifications: linux-commoninc: added DATETIME to vardepsexclude for KERNEL_IMAGE_BASE_NAME Patches: CVE-2017-1000251 (BlueBorne) JTAG with running Linux Kernel systemd /etc/localtime symlinks chasing Fixed recipe version: sumo: dt-utils 2016080 morty: linux-mainline 4124-

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) c

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) c

BlueBorne Exploits & Framework ============================= This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under android exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under linux-bluez exploits for the Linux-RCE vulnerability (CVE-2017-1000

-CVE-2017-0785-BlueBorne-PoC CVE-2017-0785 BlueBorne PoC General Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth Armis h

THC_BlueBorne "Projet long" TLS-SEC: réalisation de challenges tutoriel pour la Toulouse Hacking Convention Ce tuto consiste en l'explication et la démonstration d'exploitation de 2 vulnérabilités présentes dans la pile protocolaire Bluetooth Ce projet reprend en très grande partie les travaux de recherches BlueBo

Kaosagnt's Ansible Everyday Utils This project contains many of the Ansible playbooks that I use daily as a Systems Administrator in the pursuit of easy server task automation Installation You will need to setup and install Ansible like you normally would before using what is presented here Hint: it uses ansible wwwansiblecom Optional: Create an ansible-everyd

-CVE-2017-0785-BlueBorne-PoC CVE-2017-0785 BlueBorne PoC General Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth Armis h

Linux Kernel Exploitation Some exploitation methods and techniques are outdated and don't work anymore on newer kernels Pull requests are welcome Books 2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani Exploitation techniques 2018: "Linux-Kernel-Exploit Stack Smashing" [article] 2018, HitB: "Mirror

Linux Kernel Exploitation Some exploitation methods and techniques are outdated and don't work anymore on newer kernels Pull requests are welcome Books 2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani Exploitation techniques 2018: "Linux-Kernel-Exploit Stack Smashing" [article] 2018, HitB: "Mirror

Linux Kernel Exploitation Pull requests are welcome Books 2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani Exploitation techniques 2019: "Leak kernel pointer by exploiting uninitialized uses in Linux kernel" by Jinbum Park [slides] 2018: "Linux Kernel universal heap spray" by Vitaly Nikolenko [arti

Awesome CVE PoC A curated list of CVE PoCs Here is a collection about Proof of Concepts of Common Vulnerabilities and Exposures, and you may also want to check out awesome-web-security Please read the contribution guidelines before contributing This repo is full of PoCs for CVEs If you enjoy this awesome list and would like to support it, check out my Patreon page :

Recent Articles

BlueBorne Vulnerability Also Affects 20Mil Amazon Echo and Google Home Devices
BleepingComputer • Catalin Cimpanu • 15 Nov 2017

Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm Armis announced today.
Both Amazon and Google have issued patches for the affected products, hence today's disclosure from Armis.
BlueBorne is a set of eight vulnerabilities in the Bluetooth implementations deployed on Android, iOS, Microsoft, and Linux. Affected OS makers and several IoT device makers issued updates in mi...

Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices
Threatpost • Tom Spring • 12 Sep 2017

Researchers disclosed a bevy of Bluetooth vulnerabilities Tuesday that threaten billions of devices from Android and Apple smartphones to millions of printers, smart TVs and IoT devices that use the short-range wireless protocol.
Worse, according to researchers at IoT security firm Armis that found the attack vector, the so-called “BlueBorne” attacks can jump from one nearby Bluetooth device to another wirelessly. It estimates that there are 5.3 billion devices at risk.
“If exp...

BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices
BleepingComputer • Catalin Cimpanu • 12 Sep 2017

Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.
Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device.
They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, im...