Search criteria

12 vulnerabilities found for bluetooth_stack by toshiba

FKIE_CVE-2015-0884

Vulnerability from fkie_nvd - Published: 2015-02-28 02:59 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:9.10.27\\(t\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "89F5E974-9498-4CFC-AB77-7EC06369813D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshiba:service_station:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F48B29-F40B-494C-BC16-8216AC23DA82",
              "versionEndIncluding": "2.2.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de la b\u00fasqueda de ruta en Windows sin entrecomillar en Toshiba Bluetooth Stack para Windows anterior a 9.10.32(T) y Service Station anterior a 2.2.14 permite a usuarios locales ganar privilegios a trav\u00e9s de una aplicaci\u00f3n troyana con un nombre compuesto de una subcadena inicial de una ruta que contiene un caracter de espacio."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/428.html\"\u003eCWE-428: Unquoted Search Path or Element\u003c/a\u003e",
  "id": "CVE-2015-0884",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-02-28T02:59:33.767",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/632140"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.securitytracker.com/id/1031825"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/632140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5611

Vulnerability from fkie_nvd - Published: 2006-10-31 00:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405.
Impacted products
Vendor Product Version
toshiba bluetooth_stack *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92D22FC-804D-45DC-A370-BC978F6CC664",
              "versionEndIncluding": "4.20.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Toshiba Bluetooth Stack anterior a 4.20.01 tiene un impacto desconocido y vectores de ataque, relacionados con 4.20.01(T) \"Security fix.\" NOTA: debido a la carencia de detalles del vendedor consultado, no est\u00e1 claro si esta edici\u00f3n est\u00e1 relacionada con CVE-2006-5405."
    }
  ],
  "id": "CVE-2006-5611",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-10-31T00:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-3146

Vulnerability from fkie_nvd - Published: 2006-06-22 22:06 - Updated: 2025-04-03 01:03
Severity ?
Summary
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
References
cve@mitre.orghttp://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2
cve@mitre.orghttp://attrition.org/pipermail/vim/2006-October/001085.html
cve@mitre.orghttp://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html
cve@mitre.orghttp://secunia.com/advisories/20657Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016345
cve@mitre.orghttp://trifinite.org/blog/archives/2006/06/update_tosiba_a.html
cve@mitre.orghttp://trifinite.org/trifinite_advisory_toshiba.htmlVendor Advisory
cve@mitre.orghttp://www.osvdb.org/26686
cve@mitre.orghttp://www.securityfocus.com/archive/1/437811/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/18527Exploit
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2455Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27228
af854a3a-2127-422b-91ae-364da2661108http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2
af854a3a-2127-422b-91ae-364da2661108http://attrition.org/pipermail/vim/2006-October/001085.html
af854a3a-2127-422b-91ae-364da2661108http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20657Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016345
af854a3a-2127-422b-91ae-364da2661108http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html
af854a3a-2127-422b-91ae-364da2661108http://trifinite.org/trifinite_advisory_toshiba.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26686
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437811/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18527Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2455Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27228

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA66D53B-0896-4427-82C1-A43273F1CB56",
              "versionEndIncluding": "4.00.29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A3CCBE-29F6-4833-9839-0CEAB0C33A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB969B2-F6B7-48C0-9B4D-EC9F92944CA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.31a:*:*:*:*:*:*:*",
              "matchCriteriaId": "950ACF9E-0783-42E5-A804-18A9F26E038A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D00C96-6DA5-453F-A7E2-694E0B83D68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.01.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2ACFAD-8406-4478-8D12-F4EC8684728C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.10.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6160E18A-DE9C-4D0A-A901-BC2BB1CE3F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01049F3C-7EE1-4836-BF9C-C2CFE84A03D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "484C6E65-24BA-4D07-8BD1-71384E63F41D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6F9A-626B-4F7B-9804-3E97C0D8624F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F031926C-3138-4D5E-81F4-ED34C95367C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:4.00.01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E31608-3811-491C-9759-6F66D0B4C6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:4.00.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "611EB66B-01DA-43DE-8DFE-0D6F5AD0657A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:4.00.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "952E2AD5-508B-4FEE-8417-5F9611EA886E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack.  NOTE: this issue was originally reported for 4.00.23."
    },
    {
      "lang": "es",
      "value": "El controlador TOSRFBD.SYS para Toshiba Bluetooth Stack v4.00.29 y anteriores en Windows permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de una solicitud L2CAP echo que provoca una acceso \"fuera de rango\" a memoria, similar al \"Ping  de la Muerte\" tal y como lo demuestra BlueSmack. NOTA: este problema fue reportado originalmente para v4.00.23.\r\n"
    }
  ],
  "id": "CVE-2006-3146",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-22T22:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20657"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016345"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26686"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18527"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2455"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18527"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-0212

Vulnerability from fkie_nvd - Published: 2006-01-14 01:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31A7DCAC-2DF7-4EB1-B321-A1A331F32ED8",
              "versionEndIncluding": "4.00.23t",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A3CCBE-29F6-4833-9839-0CEAB0C33A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB969B2-F6B7-48C0-9B4D-EC9F92944CA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.31a:*:*:*:*:*:*:*",
              "matchCriteriaId": "950ACF9E-0783-42E5-A804-18A9F26E038A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.00.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D00C96-6DA5-453F-A7E2-694E0B83D68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.01.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2ACFAD-8406-4478-8D12-F4EC8684728C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.10.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6160E18A-DE9C-4D0A-A901-BC2BB1CE3F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01049F3C-7EE1-4836-BF9C-C2CFE84A03D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "484C6E65-24BA-4D07-8BD1-71384E63F41D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6F9A-626B-4F7B-9804-3E97C0D8624F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:3.20.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F031926C-3138-4D5E-81F4-ED34C95367C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:4.00.01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E31608-3811-491C-9759-6F66D0B4C6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshiba:bluetooth_stack:4.00.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "611EB66B-01DA-43DE-8DFE-0D6F5AD0657A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en servicios OBEX Push en Toshiba Bluetooth Stack 4.00.23(T) y versiones anteriores permite a atacantes remotos subir archivos arbitrarios a localizaciones remotas arbitrarias especificadas por secuencias .. (punto punto), seg\u00fan lo demostrado por secuencias ..\\\\ en el argumento RFILE de ussp-push."
    }
  ],
  "id": "CVE-2006-0212",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-01-14T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18437"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015486"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015486"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0184"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2015-0884 (GCVE-0-2015-0884)

Vulnerability from cvelistv5 – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:11.427Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
          },
          {
            "name": "1031825",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031825"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
          },
          {
            "name": "VU#632140",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/632140"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-19T15:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
        },
        {
          "name": "1031825",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031825"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
        },
        {
          "name": "VU#632140",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/632140"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-0884",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.support.toshiba.com/sscontent?contentId=4007187",
              "refsource": "CONFIRM",
              "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
            },
            {
              "name": "1031825",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031825"
            },
            {
              "name": "http://www.support.toshiba.com/sscontent?contentId=4007185",
              "refsource": "CONFIRM",
              "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
            },
            {
              "name": "VU#632140",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/632140"
            },
            {
              "name": "http://jvn.jp/vu/JVNVU99205169/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-0884",
    "datePublished": "2015-02-28T02:00:00",
    "dateReserved": "2015-01-08T00:00:00",
    "dateUpdated": "2024-08-06T04:26:11.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5611 (GCVE-0-2006-5611)

Vulnerability from cvelistv5 – Published: 2006-10-31 00:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:53.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
          },
          {
            "name": "toshiba-bluetooth-unspecified(44391)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
        },
        {
          "name": "toshiba-bluetooth-unspecified(44391)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook",
              "refsource": "CONFIRM",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
            },
            {
              "name": "toshiba-bluetooth-unspecified(44391)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5611",
    "datePublished": "2006-10-31T00:00:00",
    "dateReserved": "2006-10-30T00:00:00",
    "dateUpdated": "2024-08-07T19:55:53.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3146 (GCVE-0-2006-3146)

Vulnerability from cvelistv5 – Published: 2006-06-22 22:00 – Updated: 2024-08-07 18:16
VLAI?
Summary
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:16:05.935Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-2455",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2455"
          },
          {
            "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
          },
          {
            "name": "toshiba-bluetooth-dos(27228)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
          },
          {
            "name": "20657",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20657"
          },
          {
            "name": "1016345",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016345"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
          },
          {
            "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
          },
          {
            "name": "26686",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26686"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
          },
          {
            "name": "18527",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18527"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack.  NOTE: this issue was originally reported for 4.00.23."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-2455",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2455"
        },
        {
          "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
        },
        {
          "name": "toshiba-bluetooth-dos(27228)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
        },
        {
          "name": "20657",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20657"
        },
        {
          "name": "1016345",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016345"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
        },
        {
          "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
        },
        {
          "name": "26686",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26686"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
        },
        {
          "name": "18527",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18527"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack.  NOTE: this issue was originally reported for 4.00.23."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-2455",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2455"
            },
            {
              "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
              "refsource": "VIM",
              "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
            },
            {
              "name": "toshiba-bluetooth-dos(27228)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
            },
            {
              "name": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html",
              "refsource": "MISC",
              "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
            },
            {
              "name": "20657",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20657"
            },
            {
              "name": "1016345",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016345"
            },
            {
              "name": "http://trifinite.org/trifinite_advisory_toshiba.html",
              "refsource": "MISC",
              "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
            },
            {
              "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
            },
            {
              "name": "26686",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26686"
            },
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
              "refsource": "CONFIRM",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
            },
            {
              "name": "18527",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18527"
            },
            {
              "name": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html",
              "refsource": "MISC",
              "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3146",
    "datePublished": "2006-06-22T22:00:00",
    "dateReserved": "2006-06-22T00:00:00",
    "dateUpdated": "2024-08-07T18:16:05.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0212 (GCVE-0-2006-0212)

Vulnerability from cvelistv5 – Published: 2006-01-14 01:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:25:34.002Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
          },
          {
            "name": "16236",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16236"
          },
          {
            "name": "ADV-2006-0184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0184"
          },
          {
            "name": "18437",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18437"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
          },
          {
            "name": "22380",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22380"
          },
          {
            "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
          },
          {
            "name": "1015486",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015486"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
        },
        {
          "name": "16236",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16236"
        },
        {
          "name": "ADV-2006-0184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0184"
        },
        {
          "name": "18437",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18437"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
        },
        {
          "name": "22380",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22380"
        },
        {
          "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
        },
        {
          "name": "1015486",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015486"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0212",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
            },
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
              "refsource": "MISC",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
            },
            {
              "name": "16236",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16236"
            },
            {
              "name": "ADV-2006-0184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0184"
            },
            {
              "name": "18437",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18437"
            },
            {
              "name": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt",
              "refsource": "MISC",
              "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
            },
            {
              "name": "22380",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22380"
            },
            {
              "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
            },
            {
              "name": "1015486",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015486"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0212",
    "datePublished": "2006-01-14T01:00:00",
    "dateReserved": "2006-01-14T00:00:00",
    "dateUpdated": "2024-08-07T16:25:34.002Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-0884 (GCVE-0-2015-0884)

Vulnerability from nvd – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:11.427Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
          },
          {
            "name": "1031825",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031825"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
          },
          {
            "name": "VU#632140",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/632140"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-19T15:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
        },
        {
          "name": "1031825",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031825"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
        },
        {
          "name": "VU#632140",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/632140"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-0884",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.support.toshiba.com/sscontent?contentId=4007187",
              "refsource": "CONFIRM",
              "url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
            },
            {
              "name": "1031825",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031825"
            },
            {
              "name": "http://www.support.toshiba.com/sscontent?contentId=4007185",
              "refsource": "CONFIRM",
              "url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
            },
            {
              "name": "VU#632140",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/632140"
            },
            {
              "name": "http://jvn.jp/vu/JVNVU99205169/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/vu/JVNVU99205169/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-0884",
    "datePublished": "2015-02-28T02:00:00",
    "dateReserved": "2015-01-08T00:00:00",
    "dateUpdated": "2024-08-06T04:26:11.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5611 (GCVE-0-2006-5611)

Vulnerability from nvd – Published: 2006-10-31 00:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:53.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
          },
          {
            "name": "toshiba-bluetooth-unspecified(44391)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
        },
        {
          "name": "toshiba-bluetooth-unspecified(44391)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook",
              "refsource": "CONFIRM",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
            },
            {
              "name": "toshiba-bluetooth-unspecified(44391)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5611",
    "datePublished": "2006-10-31T00:00:00",
    "dateReserved": "2006-10-30T00:00:00",
    "dateUpdated": "2024-08-07T19:55:53.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3146 (GCVE-0-2006-3146)

Vulnerability from nvd – Published: 2006-06-22 22:00 – Updated: 2024-08-07 18:16
VLAI?
Summary
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:16:05.935Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-2455",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2455"
          },
          {
            "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
          },
          {
            "name": "toshiba-bluetooth-dos(27228)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
          },
          {
            "name": "20657",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20657"
          },
          {
            "name": "1016345",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016345"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
          },
          {
            "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
          },
          {
            "name": "26686",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26686"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
          },
          {
            "name": "18527",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18527"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack.  NOTE: this issue was originally reported for 4.00.23."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-2455",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2455"
        },
        {
          "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
        },
        {
          "name": "toshiba-bluetooth-dos(27228)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
        },
        {
          "name": "20657",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20657"
        },
        {
          "name": "1016345",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016345"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
        },
        {
          "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
        },
        {
          "name": "26686",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26686"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
        },
        {
          "name": "18527",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18527"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack.  NOTE: this issue was originally reported for 4.00.23."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-2455",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2455"
            },
            {
              "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
              "refsource": "VIM",
              "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
            },
            {
              "name": "toshiba-bluetooth-dos(27228)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
            },
            {
              "name": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html",
              "refsource": "MISC",
              "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
            },
            {
              "name": "20657",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20657"
            },
            {
              "name": "1016345",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016345"
            },
            {
              "name": "http://trifinite.org/trifinite_advisory_toshiba.html",
              "refsource": "MISC",
              "url": "http://trifinite.org/trifinite_advisory_toshiba.html"
            },
            {
              "name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
            },
            {
              "name": "26686",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26686"
            },
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
              "refsource": "CONFIRM",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
            },
            {
              "name": "18527",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18527"
            },
            {
              "name": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html",
              "refsource": "MISC",
              "url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3146",
    "datePublished": "2006-06-22T22:00:00",
    "dateReserved": "2006-06-22T00:00:00",
    "dateUpdated": "2024-08-07T18:16:05.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0212 (GCVE-0-2006-0212)

Vulnerability from nvd – Published: 2006-01-14 01:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:25:34.002Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
          },
          {
            "name": "16236",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16236"
          },
          {
            "name": "ADV-2006-0184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0184"
          },
          {
            "name": "18437",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18437"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
          },
          {
            "name": "22380",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22380"
          },
          {
            "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
          },
          {
            "name": "1015486",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015486"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
        },
        {
          "name": "16236",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16236"
        },
        {
          "name": "ADV-2006-0184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0184"
        },
        {
          "name": "18437",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18437"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
        },
        {
          "name": "22380",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22380"
        },
        {
          "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
        },
        {
          "name": "1015486",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015486"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0212",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
            },
            {
              "name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
              "refsource": "MISC",
              "url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
            },
            {
              "name": "16236",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16236"
            },
            {
              "name": "ADV-2006-0184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0184"
            },
            {
              "name": "18437",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18437"
            },
            {
              "name": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt",
              "refsource": "MISC",
              "url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
            },
            {
              "name": "22380",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22380"
            },
            {
              "name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
            },
            {
              "name": "1015486",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015486"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0212",
    "datePublished": "2006-01-14T01:00:00",
    "dateReserved": "2006-01-14T00:00:00",
    "dateUpdated": "2024-08-07T16:25:34.002Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}