elementary switchboard_bluetooth_plug 授权机制不正确

admin 2023-12-01 15:48:01 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 elementary switchboard_bluetooth_plug 授权机制不正确

CVE编号

CVE-2021-21367

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-03-13
漏洞描述
Switchboard Bluetooth Plug for elementary OS from version 2.3.0 and before version version 2.3.5 has an incorrect authorization vulnerability. When the Bluetooth plug is running (in discoverable mode), Bluetooth service requests and pairing requests are automatically accepted, allowing physically proximate attackers to pair with a device running an affected version of switchboard-plug-bluetooth without the active consent of the user. By default, elementary OS doesn't expose any services via Bluetooth that allow information to be extracted by paired Bluetooth devices. However, if such services (i.e. contact list sharing software) have been installed, it's possible that attackers have been able to extract data from such services without authorization. If no such services have been installed, attackers are only able to pair with a device running an affected version without authorization and then play audio out of the device or possibly present a HID device (keyboard, mouse, etc...) to control the device. As such, users should check the list of trusted/paired devices and remove any that are not 100% confirmed to be genuine. This is fixed in version 2.3.5. To reduce the likelihood of this vulnerability on an unpatched version, only open the Bluetooth plug for short intervals when absolutely necessary and preferably not in crowded public areas. To mitigate the risk entirely with unpatched versions, do not open the Bluetooth plug within switchboard at all, and use a different method for pairing devices if necessary (e.g. `bluetoothctl` CLI).
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907...
https://github.com/elementary/switchboard-plug-bluetooth/releases/tag/2.3.5
https://github.com/elementary/switchboard-plug-bluetooth/security/advisories/...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 elementary switchboard_bluetooth_plug * From (including) 2.3.0 Up to (excluding) 2.3.5
运行在以下环境
系统 fedora_32 switchboard-plug-bluetooth * Up to (excluding) 2.3.5-1.fc32
运行在以下环境
系统 fedora_33 switchboard-plug-bluetooth * Up to (excluding) 2.3.5-1.fc33
运行在以下环境
系统 fedora_34 switchboard-plug-bluetooth * Up to (excluding) 2.3.5-1.fc34
阿里云评分 4.1
  • 攻击路径 物理
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 越权影响
  • EXP成熟度 N/A
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-863 授权机制不正确
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0