Please disable your adblock and script blockers to view this page

Google and Intel warn of high-severity Bluetooth security bug in Linux


Intel
Bluetooth
the Linux Kernel
Google
BleedingTooth
ReadingBillions
Marshalls
TJX
Trail of Bits
IoT
BlueBorne
the Ars Orbital Transmission
CNMN Collection WIRED Media Group
Condé Nast


Dan Goodin
Google
Andy Nguyen
YouTube
Dan Guido
Ars

No matching tags

No matching tags

No matching tags


2.4.6
YouTube
CVE-2020
Linux

No matching tags

Positivity     35.00%   
   Negativity   65.00%
The New York Times
SOURCE: https://arstechnica.com/information-technology/2020/10/google-and-intel-warn-of-high-severity-bluetooth-security-bug-in-linux/
Write a review: Ars Technica
Summary

While a Google researcher said the bug allows seamless code execution by attackers within Bluetooth range, Intel is characterizing the flaw as providing an escalation of privileges or the disclosure of information.The flaw resides in BlueZ, the software stack that by default implements all Bluetooth core protocols and layers for Linux. It works with Linux versions 2.4.6 and later.So far, little is known about BleedingTooth, the name given by Google engineer Andy Nguyen, who said that a blog post will be published “soon.” A Twitter thread and a YouTube video provide the most detail and give the impression that the bug provides a reliable way for nearby attackers to execute malicious code of their choice on vulnerable Linux devices that use BlueZ for Bluetooth.Further ReadingBillions of devices imperiled by new clickless Bluetooth attack“BleedingTooth is a set of zero-click vulnerabilities in the Linux Bluetooth subsystem that can allow an unauthenticated remote attacker in short distance to execute arbitrary code with kernel privileges on vulnerable devices,” the researcher wrote. He said his discovery was inspired by research that led to BlueBorne, another proof-of-concept exploit that allowed attackers to send commands of their choice without requiring device users click any links, connect to a rogue Bluetooth device, or take any other action short of having Bluetooth turned on.BleedingTooth is a set of zero-click vulnerabilities in the Linux Bluetooth subsystem that can allow an unauthenticated remote attacker in short distance to execute arbitrary code with kernel privileges on vulnerable devices.Below is the YouTube video demonstrating how the exploit works.Intel, meanwhile, has issued this bare-bones advisory that categorizes the flaw as privilege-escalation or information-disclosure vulnerability.

As said here by Dan Goodin