Other IDs this deficiency may be known by:
|Date Last Modified
Version Specific Information:
|Cucumber 1.0 i686||fixed in linux-4.9.50-i686-1 |
|Cucumber 1.0 x86_64||fixed in linux-4.9.50-x86_64-1 |
|Cucumber 1.1 i686
||fixed in linux-4.9.50-i686-1 |
|Cucumber 1.1 x86_64
||fixed in linux-4.9.50-x86_64-1 |
This vulnerability has been dubbed "Blueborne".
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux
kernel version 3.3-rc1 and up to and including 4.13.1, are vulnerable to a
stack overflow vulnerability in the processing of L2CAP configuration responses
resulting in Remote code execution in kernel space
This vulnerability does not require you to be connected to any network, and it
does not even require you to pair your device with another Bluetooth device. All
it requires is for an attacker to be physically in range of your device
supporting Bluetooth; he can then use this vulnerability to execute arbitrary
code in the kernel space (https://www.youtube.com/watch?v=LLNtZKpL0P8).
Original Analysis (by Armis):
They claim that the impact of this vulnerability is mitigated if your kernel is
built with Stack Protection, which the Cucumber Linux kernels all are.