Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40237.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-40237
Upstream
Published
2024-05-03T03:16:11Z
Modified
2026-04-01T05:13:34.163329Z
Summary
CVE-2023-50230 affecting package bluez for versions less than 5.63-5
Details

BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.

References

Affected packages

Azure Linux:3 / bluez

Package

Name
bluez
Purl
pkg:rpm/azure-linux/bluez

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.63-5

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40237.json"