Parent: e63175ecf66f682721f2ba0337f65330aa798744
Author: Matias Karhumaa <matias.karhumaa@gmail.com>
Committer: Johan Hedberg <johan.hedberg@intel.com>
Date: 2018-10-18 19:10:26
Tree: eb6dd481c17dd119d13cecf78f12313fe6fb5591
btmon: fix segfault caused by buffer overflow Buffer overflow vulnerability in monitor/sdp.c SDP continuation handling caused btmon to crash. This happens in global static buffer which makes it non-trivial to exploit. This is nasty bug in a way that this can be triggered also over the air by sending malformed SDP Search Attribute request to device running btmon. This crash was foung by fuzzing btmon with AFL. Seems to be reproducible also with Synopsys Defensics SDP Server suite.
Diffstat
| M | monitor/sdp.c | | | 7 | ++++++- |
1 files changed, 6 insertions(+), 1 deletions(-)