{"id":"CVE-2023-50229","details":"BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.","modified":"2026-04-12T06:44:57.456413Z","published":"2024-05-03T03:16:11.680Z","related":["ALSA-2024:9413","SUSE-SU-2024:0166-1","SUSE-SU-2024:0167-1","SUSE-SU-2024:0182-1","SUSE-SU-2024:0183-1","SUSE-SU-2024:0204-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00022.html"},{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1811/"},{"type":"FIX","url":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bluez/bluez","events":[{"introduced":"63b01d0b0661d6a0048107dcb9e6f12ceac409e0"},{"fixed":"b05c3fbfd764a33dbaefbfb18680fa3296d4a31b"},{"fixed":"5ab5352531a9cc7058cce569607f3a6831464443"}],"database_specific":{"versions":[{"introduced":"5.66"},{"fixed":"5.70"}]}}],"versions":["5.66","5.67","5.68","5.69"],"database_specific":{"vanir_signatures_modified":"2026-04-12T06:44:57Z","vanir_signatures":[{"digest":{"length":831,"function_hash":"129905515860770125204907878770854051751"},"id":"CVE-2023-50229-51063d89","signature_version":"v1","target":{"function":"read_version","file":"obexd/client/pbap.c"},"signature_type":"Function","deprecated":false,"source":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"},{"digest":{"line_hashes":["164425567483586797048056782771521406564","339243539476488535186301626308607492346","26029931549650522073502581951593648305","56338152221748842126145501726730413299","56544350967026370986741586863287295304","140782047637023207733316715606570148485","285438267478055345032039066623780983565","87185564937850498998972364784924109268"],"threshold":0.9},"id":"CVE-2023-50229-d79d2322","signature_version":"v1","target":{"file":"obexd/client/pbap.c"},"signature_type":"Line","deprecated":false,"source":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50229.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}