Description
BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
Published: 2024-05-03
Score: 8.0 High
EPSS: 3.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3879-1 bluez security update
EUVD EUVD EUVD-2023-55051 BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
Ubuntu USN Ubuntu USN USN-7222-1 BlueZ vulnerabilities
History

Tue, 04 Nov 2025 17:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Bluez
Bluez bluez
CPEs cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*
Vendors & Products Bluez
Bluez bluez
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 13 Nov 2024 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Subscriptions

Bluez Bluez
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-11-04T16:10:45.761Z

Reserved: 2023-12-05T16:15:17.545Z

Link: CVE-2023-50229

cve-icon Vulnrichment

Updated: 2025-11-04T16:10:45.761Z

cve-icon NVD

Status : Modified

Published: 2024-05-03T03:16:11.680

Modified: 2025-11-04T17:15:41.913

Link: CVE-2023-50229

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-03T00:00:00Z

Links: CVE-2023-50229 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses