{"id":"CVE-2023-50230","summary":"BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability","details":"BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.","modified":"2026-05-19T07:53:42.422566Z","published":"2024-05-03T02:14:47.428Z","related":["ALSA-2024:9413","SUSE-SU-2024:0166-1","SUSE-SU-2024:0167-1","SUSE-SU-2024:0182-1","SUSE-SU-2024:0183-1","SUSE-SU-2024:0204-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50230.json","cna_assigner":"zdi","cwe_ids":["CWE-122"]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00022.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50230.json"},{"type":"ADVISORY","url":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50230"},{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1812/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bluez/bluez","events":[{"introduced":"63b01d0b0661d6a0048107dcb9e6f12ceac409e0"},{"fixed":"5ab5352531a9cc7058cce569607f3a6831464443"}]}],"versions":["5.69","5.68","5.67","5.66"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50230.json","vanir_signatures_modified":"2026-05-19T07:53:42Z","vanir_signatures":[{"signature_version":"v1","deprecated":false,"signature_type":"Function","target":{"function":"read_version","file":"obexd/client/pbap.c"},"id":"CVE-2023-50230-51063d89","digest":{"function_hash":"129905515860770125204907878770854051751","length":831},"source":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"},{"signature_version":"v1","deprecated":false,"signature_type":"Line","target":{"file":"obexd/client/pbap.c"},"id":"CVE-2023-50230-d79d2322","digest":{"threshold":0.9,"line_hashes":["164425567483586797048056782771521406564","339243539476488535186301626308607492346","26029931549650522073502581951593648305","56338152221748842126145501726730413299","56544350967026370986741586863287295304","140782047637023207733316715606570148485","285438267478055345032039066623780983565","87185564937850498998972364784924109268"]},"source":"https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}