Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-850/ |
![]() ![]() |
Mon, 24 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Tue, 18 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the PBAP_DecodeVCARD function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. | |
Title | Alpine Halo9 Stack-based Buffer Overflow | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-01-30T23:57:24.401Z
Updated: 2025-03-24T17:38:30.579Z
Reserved: 2024-01-25T00:14:40.299Z
Link: CVE-2024-23963

Updated: 2025-01-31T16:58:31.844Z

Status : Awaiting Analysis
Published: 2025-01-31T00:15:09.483
Modified: 2025-03-24T18:15:18.780
Link: CVE-2024-23963

No data.