BDU:2019-03002

Vulnerability from fstec - Published: 25.04.2019
VLAI Severity ?
Title
Уязвимость реализации протокола согласования ключей шифрования Bluetooth BR/EDR, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю реализовать атаку типа «человек посередине», вмешаться в процедуру настройки шифрования для соединения BR/EDR и уменьшить длину используемого ключа шифрования
Description
Уязвимость реализации протокола согласования ключей шифрования Bluetooth BR/EDR связана с использованием криптографических алгоритмов, содержащих дефекты. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, реализовать атаку типа «человек посередине», вмешаться в процедуру настройки шифрования для соединения BR/EDR и уменьшить длину используемого ключа шифрования
Vendor
Microsoft Corp, Google Inc, Apple Inc., Bluetooth Special Interest Group, Cisco Systems Inc., Сообщество свободного программного обеспечения
Software Name
Windows 7 Service Pack 1, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows RT 8.1, Windows 10, Windows 10 1607, Android, Windows 10 1703, Windows Server 2016, Windows Server 2012 R2 (Server Core installation), Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows 10 1709, Windows 10 1803, Windows Server 1803 (Server Core Installation), Windows 10 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 1903, Windows Server 1903 (Server Core Installation), MacOS, tvOS, watchOS, iOS, Bluetooth BR/EDR, IP Phone 8800 Series, Cisco IP Phone 8800 Series with Multiplatform, Cisco Small Business IP Phones, Telepresence Integrator C Series, Linux, Windows Server 2012 (Server Core installation)
Software Version
- (Windows 7 Service Pack 1), - (Windows 8.1), - (Windows Server 2012), - (Windows Server 2012 R2), - (Windows Server 2008 R2 Service Pack 1), - (Windows RT 8.1), - (Windows 10), - (Windows 10 1607), - (Android), - (Windows 10 1703), - (Windows Server 2016), - (Windows Server 2012 R2 (Server Core installation)), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), - (Windows 10 1709), - (Windows 10 1803), - (Windows Server 1803 (Server Core Installation)), - (Windows 10 1809), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), - (Windows 10 1903), - (Windows Server 1903 (Server Core Installation)), Sierra 10.12.6 (MacOS), High Sierra 10.13.6 (MacOS), Mojave 10.14.5 (MacOS), 12.4 (tvOS), 5.3 (watchOS), 12.4 (iOS), до 5.1 включительно (Bluetooth BR/EDR), 11.0(5)SR1 (IP Phone 8800 Series), 11.3(1) (Cisco IP Phone 8800 Series with Multiplatform), 7.6.4 (Cisco Small Business IP Phones), - (Telepresence Integrator C Series), от 4.5 до 4.9.184 включительно (Linux), от 4.10 до 4.14.132 включительно (Linux), от 4.15 до 4.19.57 включительно (Linux), от 4.20 до 5.1.16 включительно (Linux), - (Windows Server 2012 (Server Core installation)), от 4.0 до 4.4.184 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для Bluetooth BR/EDR: https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/ Для программных продуктов Microsoft Corp.: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506 Для программных продуктов Apple Inc.: Обновление программного обеспечения до актуальной версии Для программных продуктов Cisco Systems Inc.: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth Для Android: https://source.android.com/security/bulletin/2019-08-01 Для Linux: https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.58 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.185 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.185 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
Reference
https://bugzilla.kernel.org/show_bug.cgi?id=203997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506 https://kb.cert.org/vuls/id/918987/ https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.58 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.185 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.185 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 https://knobattack.com/ https://nvd.nist.gov/vuln/detail/CVE-2019-9506 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506 https://seclists.org/fulldisclosure/2019/Aug/11 https://seclists.org/fulldisclosure/2019/Aug/13 https://seclists.org/fulldisclosure/2019/Aug/14 https://seclists.org/fulldisclosure/2019/Aug/15 https://source.android.com/security/bulletin/2019-08-01 https://support.apple.com/ru-ru/HT210346 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4147-1 https://usn.ubuntu.com/usn/usn-4115-1 https://usn.ubuntu.com/usn/usn-4118-1 https://usn.ubuntu.com/usn/usn-4147-1 https://vulmon.com/vulnerabilitydetails?qid=CVE-2019-9506 https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/ https://www.cve.org/CVERecord?id=CVE-2019-9506 https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli
CWE
CWE-310, CWE-327

{
  "CVSS 2.0": "AV:A/AC:L/Au:N/C:C/I:C/A:N",
  "CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp, Google Inc, Apple Inc., Bluetooth Special Interest Group, Cisco Systems Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Windows 7 Service Pack 1), - (Windows 8.1), - (Windows Server 2012), - (Windows Server 2012 R2), - (Windows Server 2008 R2 Service Pack 1), - (Windows RT 8.1), - (Windows 10), - (Windows 10 1607), - (Android), - (Windows 10 1703), - (Windows Server 2016), - (Windows Server 2012 R2 (Server Core installation)), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), - (Windows 10 1709), - (Windows 10 1803), - (Windows Server 1803 (Server Core Installation)), - (Windows 10 1809), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), - (Windows 10 1903), - (Windows Server 1903 (Server Core Installation)), Sierra 10.12.6 (MacOS), High Sierra 10.13.6 (MacOS), Mojave 10.14.5 (MacOS), 12.4 (tvOS), 5.3 (watchOS), 12.4 (iOS), \u0434\u043e 5.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Bluetooth BR/EDR), 11.0(5)SR1 (IP Phone 8800 Series), 11.3(1) (Cisco IP Phone 8800 Series with Multiplatform), 7.6.4 (Cisco Small Business IP Phones), - (Telepresence Integrator C Series), \u043e\u0442 4.5 \u0434\u043e 4.9.184 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.132 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.57 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.1.16 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), - (Windows Server 2012 (Server Core installation)), \u043e\u0442 4.0 \u0434\u043e 4.4.184 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Bluetooth BR/EDR: \nhttps://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft Corp.:\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Apple Inc.:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Cisco Systems Inc.:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth\n\n\u0414\u043b\u044f Android:\nhttps://source.android.com/security/bulletin/2019-08-01\n\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.58\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.185\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.185\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "25.04.2019",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "31.05.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.08.2019",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03002",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-9506",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows 7 Service Pack 1, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows RT 8.1, Windows 10, Windows 10 1607, Android, Windows 10 1703, Windows Server 2016, Windows Server 2012 R2 (Server Core installation), Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows 10 1709, Windows 10 1803, Windows Server 1803 (Server Core Installation), Windows 10 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 1903, Windows Server 1903 (Server Core Installation), MacOS, tvOS, watchOS, iOS, Bluetooth BR/EDR, IP Phone 8800 Series, Cisco IP Phone 8800 Series with Multiplatform, Cisco Small Business IP Phones, Telepresence Integrator C Series, Linux, Windows Server 2012 (Server Core installation)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows 7 Service Pack 1 - 64-bit, Microsoft Corp Windows 7 Service Pack 1 - 32-bit, Microsoft Corp Windows 8.1 - 64-bit, Microsoft Corp Windows 8.1 - 32-bit, Microsoft Corp Windows Server 2012 - , Microsoft Corp Windows Server 2012 R2 - , Microsoft Corp Windows Server 2008 R2 Service Pack 1 - 64-bit, Microsoft Corp Windows RT 8.1 - ARM, Microsoft Corp Windows 10 - 64-bit, Microsoft Corp Windows 10 - 32-bit, Microsoft Corp Windows 10 1607 - 64-bit, Microsoft Corp Windows 10 1607 - 32-bit, Microsoft Corp Windows 10 1703 - 32-bit, Microsoft Corp Windows Server 2016 - , Microsoft Corp Windows 10 1703 - 64-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) - , Microsoft Corp Windows Server 2016 (Server Core installation) - , Microsoft Corp Windows Server 2008 R2 Service Pack 1 - Itanium, Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 64-bit, Microsoft Corp Windows 10 1709 - 64-bit, Microsoft Corp Windows 10 1709 - 32-bit, Microsoft Corp Windows 10 1803 - 64-bit, Microsoft Corp Windows 10 1803 - 32-bit, Microsoft Corp Windows Server 1803 (Server Core Installation) - , Microsoft Corp Windows 10 1809 - 64-bit, Microsoft Corp Windows 10 1809 - 32-bit, Microsoft Corp Windows Server 2019 - , Microsoft Corp Windows Server 2019 (Server Core installation) - , Microsoft Corp Windows 10 1809 - ARM64, Microsoft Corp Windows 10 1709 - ARM64, Microsoft Corp Windows 10 1803 - ARM64, Microsoft Corp Windows 10 1903 - 32-bit, Microsoft Corp Windows 10 1903 - 64-bit, Microsoft Corp Windows 10 1903 - ARM64, Microsoft Corp Windows Server 1903 (Server Core Installation) - , Microsoft Corp Windows Server 2012 (Server Core installation) - ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u043b\u044e\u0447\u0435\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f Bluetooth BR/EDR, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb, \u0432\u043c\u0435\u0448\u0430\u0442\u044c\u0441\u044f \u0432 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u0443 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f BR/EDR \u0438 \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u0434\u043b\u0438\u043d\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 (CWE-310), \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0438\u043b\u0438 \u0440\u0438\u0441\u043a\u0438 (CWE-327)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u043b\u044e\u0447\u0435\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f Bluetooth BR/EDR \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb, \u0432\u043c\u0435\u0448\u0430\u0442\u044c\u0441\u044f \u0432 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u0443 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f BR/EDR \u0438 \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u0434\u043b\u0438\u043d\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://bugzilla.kernel.org/show_bug.cgi?id=203997\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506\nhttps://kb.cert.org/vuls/id/918987/\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.58\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.185\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.185\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\nhttps://knobattack.com/\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-9506\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506\nhttps://seclists.org/fulldisclosure/2019/Aug/11\nhttps://seclists.org/fulldisclosure/2019/Aug/13\nhttps://seclists.org/fulldisclosure/2019/Aug/14\nhttps://seclists.org/fulldisclosure/2019/Aug/15\nhttps://source.android.com/security/bulletin/2019-08-01\nhttps://support.apple.com/ru-ru/HT210346\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth\nhttps://ubuntu.com/security/notices/USN-4115-1\nhttps://ubuntu.com/security/notices/USN-4118-1\nhttps://ubuntu.com/security/notices/USN-4147-1\nhttps://usn.ubuntu.com/usn/usn-4115-1\nhttps://usn.ubuntu.com/usn/usn-4118-1\nhttps://usn.ubuntu.com/usn/usn-4147-1\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2019-9506\nhttps://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/\nhttps://www.cve.org/CVERecord?id=CVE-2019-9506\nhttps://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-310, CWE-327",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,1)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…