Miggo Logo

CVE-2016-9801: In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c...

5.3

CVSS Score
3.0

Basic Information

EPSS Score
0.59033%
Published
5/17/2022
Updated
1/27/2023
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary vulnerable function 'set_ext_ctrl' was identified directly from the vulnerability description and the ASAN report in the spinics.net mailing list. The other functions ('conf_opt', 'conf_rsp', 'l2cap_parse') are identified from the ASAN stack trace as being part of the execution path that leads to the exploitation of the vulnerability in 'set_ext_ctrl'. While these functions themselves might not contain the overflow, they process the input that eventually triggers it. The confidence for 'set_ext_ctrl' is high due to direct evidence. The confidence for the other functions is medium as they are part of the exploit chain but not the direct site of the overflow. No commit information was found to definitively confirm the patch and the exact nature of the fix, so the analysis relies on the provided vulnerability details and the ASAN report.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *lu*Z *.**, * *u***r ov*r*low w*s o*s*rv** in "s*t_*xt_*trl" *un*tion in "tools/p*rs*r/l***p.*" sour** *il* w**n pro**ssin* *orrupt** *ump *il*.

Reasoning

T** prim*ry vuln*r**l* *un*tion 's*t_*xt_*trl' w*s i**nti*i** *ir**tly *rom t** vuln*r**ility **s*ription *n* t** *S*N r*port in t** spini*s.n*t m*ilin* list. T** ot**r *un*tions ('*on*_opt', '*on*_rsp', 'l***p_p*rs*') *r* i**nti*i** *rom t** *S*N st