Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-0750

10 documents7 sources
Severity
7.2HIGH
EPSS
0.6%
top 30.62%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 27
Latest updateMay 1

Description

The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages6 packages

NVDlinux/linux_kernel36 versions+35
NVDredhat/linux7.3, 9.0+1
NVDconectiva/linux10.0
NVDsuse/suse_linux1.0, 9.3+1

Also affects: Ubuntu Linux 4.1, Enterprise Linux 4.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hrxw-8xj5-4j6f: The bluez_sock_create function in the Bluetooth stack for Linux kernel 22022-05-01
CVEList
CVE-2005-0750: The bluez_sock_create function in the Bluetooth stack for Linux kernel 22005-04-03

💥Exploits & PoCs

4
Exploit-DB
Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2)2005-10-26
Exploit-DB
Linux Kernel 2.4.30/2.6.11.5 - BlueTooth 'bluez_sock_create' Local Privilege Escalation2005-10-19
Exploit-DB
Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index Privilege Escalation (1)2005-04-08
Exploit-DB
Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC)2005-03-28

📋Vendor Advisories

2
Ubuntu
Linux kernel vulnerabilities2005-04-01
Red Hat
security flaw2005-03-24

💬Community

1
Bugzilla
CVE-2005-0750 security flaw2018-08-16