{"id":"ALPINE-CVE-2017-1000250","details":"All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.","modified":"2026-03-09T01:03:42.061957Z","published":"2017-09-12T17:29:00.197Z","upstream":["CVE-2017-1000250"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-1000250"}],"affected":[{"package":{"name":"bluez","ecosystem":"Alpine:v3.3","purl":"pkg:apk/alpine/bluez?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.36-r1"}]}],"versions":["4.101-r0","4.101-r1","4.101-r2","4.101-r3","4.64-r0","4.64-r1","4.69-r0","4.69-r1","4.69-r2","4.72-r0","4.81-r0","4.87-r0","4.89-r0","4.90-r0","4.90-r1","4.91-r0","4.93-r0","4.93-r1","4.94-r0","4.94-r1","4.95-r0","4.96-r0","4.99-r0","4.99-r1","4.99-r2","5.10-r0","5.11-r0","5.11-r1","5.13-r0","5.13-r1","5.14-r0","5.16-r0","5.18-r0","5.19-r0","5.20-r0","5.21-r0","5.22-r0","5.23-r0","5.24-r0","5.25-r0","5.26-r0","5.27-r0","5.28-r0","5.30-r0","5.30-r1","5.31-r0","5.32-r0","5.33-r0","5.34-r0","5.36-r0","5.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-1000250.json"}},{"package":{"name":"bluez","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/bluez?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.40-r1"}]}],"versions":["4.101-r0","4.101-r1","4.101-r2","4.101-r3","4.64-r0","4.64-r1","4.69-r0","4.69-r1","4.69-r2","4.72-r0","4.81-r0","4.87-r0","4.89-r0","4.90-r0","4.90-r1","4.91-r0","4.93-r0","4.93-r1","4.94-r0","4.94-r1","4.95-r0","4.96-r0","4.99-r0","4.99-r1","4.99-r2","5.10-r0","5.11-r0","5.11-r1","5.13-r0","5.13-r1","5.14-r0","5.16-r0","5.18-r0","5.19-r0","5.20-r0","5.21-r0","5.22-r0","5.23-r0","5.24-r0","5.25-r0","5.26-r0","5.27-r0","5.28-r0","5.30-r0","5.30-r1","5.31-r0","5.32-r0","5.33-r0","5.34-r0","5.36-r0","5.37-r0","5.38-r0","5.39-r0","5.40-r0","5.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-1000250.json"}},{"package":{"name":"bluez","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/bluez?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.42-r1"}]}],"versions":["4.101-r0","4.101-r1","4.101-r2","4.101-r3","4.64-r0","4.64-r1","4.69-r0","4.69-r1","4.69-r2","4.72-r0","4.81-r0","4.87-r0","4.89-r0","4.90-r0","4.90-r1","4.91-r0","4.93-r0","4.93-r1","4.94-r0","4.94-r1","4.95-r0","4.96-r0","4.99-r0","4.99-r1","4.99-r2","5.10-r0","5.11-r0","5.11-r1","5.13-r0","5.13-r1","5.14-r0","5.16-r0","5.18-r0","5.19-r0","5.20-r0","5.21-r0","5.22-r0","5.23-r0","5.24-r0","5.25-r0","5.26-r0","5.27-r0","5.28-r0","5.30-r0","5.30-r1","5.31-r0","5.32-r0","5.33-r0","5.34-r0","5.36-r0","5.37-r0","5.38-r0","5.39-r0","5.40-r0","5.40-r1","5.41-r0","5.42-r0","5.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-1000250.json"}},{"package":{"name":"bluez","ecosystem":"Alpine:v3.6","purl":"pkg:apk/alpine/bluez?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.44-r3"}]}],"versions":["4.101-r0","4.101-r1","4.101-r2","4.101-r3","4.64-r0","4.64-r1","4.69-r0","4.69-r1","4.69-r2","4.72-r0","4.81-r0","4.87-r0","4.89-r0","4.90-r0","4.90-r1","4.91-r0","4.93-r0","4.93-r1","4.94-r0","4.94-r1","4.95-r0","4.96-r0","4.99-r0","4.99-r1","4.99-r2","5.10-r0","5.11-r0","5.11-r1","5.13-r0","5.13-r1","5.14-r0","5.16-r0","5.18-r0","5.19-r0","5.20-r0","5.21-r0","5.22-r0","5.23-r0","5.24-r0","5.25-r0","5.26-r0","5.27-r0","5.28-r0","5.30-r0","5.30-r1","5.31-r0","5.32-r0","5.33-r0","5.34-r0","5.36-r0","5.37-r0","5.38-r0","5.39-r0","5.40-r0","5.40-r1","5.41-r0","5.42-r0","5.43-r0","5.44-r0","5.44-r1","5.44-r2","5.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-1000250.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}