CVE-2019-8922

8.8 HIGH
Published: November 29, 2021 Modified: April 15, 2026
View on NVD

Description

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html
Source: cve@mitre.org
Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20211203-0002/
Source: cve@mitre.org
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20211203-0002/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
0.1%
17th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux debian bluez