CVE-2022-26878 Bluetooth driver has a memory leak.
This issue can be induced with the help of a network stress test tool (nmap) that sends a large number of packets in short period of time.
However, it can affect any device that supports Bluetooth and has a system with Linux installed that is vulnerable to this issue.
As a consequence, a remote attacker against such a system can cause a denial-of-service condition.
In addition, a local user can cause a denial-of-service condition by sending a very large number of characters (e.g. a script) to the system with a large amount of data.
Moreover, an attacker can cause a remote user to consume a large amount of CPU resources (by sending a large number of TCP packets) by sending a large amount of data to the system.
In the case of a local user, this can result in a denial-of-service condition by sending a very large amount of data (such as a script) to the system.
Users can avoid any of these issues by following basic security precautions like disabling remote access and keeping the system up-to-date with the latest software.
This issue was resolved with the help of a patch from Microsoft.
References br >
http://nmap.org/nsedoc/ https://tools.ietf.org/html/rfc7810 http://www.lhotka.net/weblog/2017/8/5/crypto-puzzles-csrf-request
The importance of digital marketing can be seen with the stats on 89% of marketers saying methods like PPC advertising are successful and a drop in conversion rates with over 20% as well as an increase in brand awareness by 80%.
Microsoft released a patch for CVE-2018-0886
A security vulnerability known as CVE-2018-0886 recently came to light and was patched by Microsoft. This vulnerability can be induced with the use of a network stress-test tool, nmap, that sends a large number of packets in short period of time. However, it can affect any device that supports Bluetooth and has a system with Linux installed that is vulnerable to this issue.
As a consequence, a remote attacker against such a system can cause a denial-of-service condition. In addition, a local user can cause a denial-of-service condition by sending a very large number of characters (e.g., a script) to the system with a large amount of data. Moreover, an attacker can cause a remote user to consume a large amount of CPU resources (by sending a large number of TCP packets) by sending a large amount of data to the system. In the case of a local user, this can result in an denial-of-service condition by sending very large amount of data (such as script) to the system.
Users could avoid any one or more these issues by following basic security precautions like disabling remote access and keeping their systems up-to-date with the latest software.
Remote Denial of Service Attack
A remote attacker can cause a denial-of-service condition on the system by using a network stress test tool (nmap) to send a large number of packets in short period of time.
However, this also affects other devices that support Bluetooth and have Linux installed. The vulnerability is present because the system has to process these large amounts of packets and it can affect users who are browsing the web or running any programs that use Bluetooth.
As a consequence, an attacker against such a system can cause a denial-of-service condition.
Overview of the issue
If a Bluetooth device is running on a Linux host, nmap can be used to send many packets (e.g. tens of thousands) in short amount of time, thereby causing the system to freeze up or crash if it does not have much CPU power. This can cause denial-of-service condition for the system or for any other devices connected via Bluetooth.
The problem impacts all versions of Linux and can be induced by any software that supports Bluetooth and has a system with Linux installed.
The issue was resolved through Microsoft’s patch release, CVE-2022-26878.
Timeline
Published on: 03/11/2022 07:15:00 UTC
Last modified on: 03/22/2022 13:50:00 UTC
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18
- https://lore.kernel.org/linux-bluetooth/1A203F5E-FB5E-430C-BEA3-86B191D69D58@holtmann.org/
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17
- http://www.openwall.com/lists/oss-security/2022/03/11/1
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26878