VAR-200610-0239

Vulnerability from variot - Updated: 2023-12-18 12:46

Unspecified vulnerability in Toshiba Bluetooth wireless device driver 3.x and 4 through 4.00.35, as used in multiple products, allows physically proximate attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via crafted Bluetooth packets. Bluetooth Wireless Device Driver is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users.


Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: Toshiba Bluetooth Stack Memory Corruption Vulnerability

SECUNIA ADVISORY ID: SA22402

VERIFY ADVISORY: http://secunia.com/advisories/22402/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE:

From remote

SOFTWARE: Toshiba Bluetooth Stack 4.x http://secunia.com/product/6807/ Toshiba Bluetooth Stack 3.x http://secunia.com/product/6806/

DESCRIPTION: A vulnerability has been reported in Toshiba Bluetooth Stack, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

Successful exploitation requires knowledge of the Bluetooth device address.

The vulnerability is reported in version 3.x and versions 4 through 4.00.35. Other versions may also be affected.

NOTE: Products from other vendors using the Toshiba Bluetooth Stack may also be affected. The Toshiba Bluetooth Stack running on 64-bit platforms is reportedly not affected.

SOLUTION: Update to the latest version.

PROVIDED AND/OR DISCOVERED BY: David Maynor, SecureWorks and Jon Ellch.

ORIGINAL ADVISORY: http://www.secureworks.com/press/20061011-dell.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200610-0239",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "bluetooth wireless device driver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "toshiba",
        "version": "4.x"
      },
      {
        "model": "bluetooth wireless device driver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "toshiba",
        "version": "3.x"
      },
      {
        "model": "bluetooth wireless device driver",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "toshiba",
        "version": "3.x and  4 to  4.00.35"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:toshiba:bluetooth_wireless_device_driver:3.x:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshiba:bluetooth_wireless_device_driver:4.x:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "87177"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2006-5405",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2006-5405",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "id": "VHN-21513",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:H/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-5405",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200610-323",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-21513",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Toshiba Bluetooth wireless device driver 3.x and 4 through 4.00.35, as used in multiple products, allows physically proximate attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via crafted Bluetooth packets. Bluetooth Wireless Device Driver is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected application, denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nToshiba Bluetooth Stack Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA22402\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/22402/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nToshiba Bluetooth Stack 4.x\nhttp://secunia.com/product/6807/\nToshiba Bluetooth Stack 3.x\nhttp://secunia.com/product/6806/\n\nDESCRIPTION:\nA vulnerability has been reported in Toshiba Bluetooth Stack, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) and potentially compromise a vulnerable system. \n\nSuccessful exploitation requires knowledge of the Bluetooth device\naddress. \n\nThe vulnerability is reported in version 3.x and versions 4 through\n4.00.35. Other versions may also be affected. \n\nNOTE: Products from other vendors using the Toshiba Bluetooth Stack\nmay also be affected. The Toshiba Bluetooth Stack running on 64-bit\nplatforms is reportedly not affected. \n\nSOLUTION:\nUpdate to the latest version. \n\nPROVIDED AND/OR DISCOVERED BY:\nDavid Maynor, SecureWorks and Jon Ellch. \n\nORIGINAL ADVISORY:\nhttp://www.secureworks.com/press/20061011-dell.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "db": "PACKETSTORM",
        "id": "50988"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-5405",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1017075",
        "trust": 2.0
      },
      {
        "db": "SREASON",
        "id": "1744",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "22402",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-4057",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "29503",
        "trust": 0.6
      },
      {
        "db": "VIM",
        "id": "20061017 SECUREWORKS RESEARCH CLIENT ADVISORY: MULTIPLE VENDOR BLUETOOTH MEMORY STACK CORRUPTION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20061012 SECUREWORKS RESEARCH CLIENT ADVISORY: MULTIPLE VENDOR BLUETOOTH MEMORY STACK CORRUPTION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "87177",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-21513",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "50988",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "PACKETSTORM",
        "id": "50988"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "id": "VAR-200610-0239",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:46:58.201000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Bluetooth",
        "trust": 0.8,
        "url": "http://aps.toshiba-tro.de/bluetooth/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.secureworks.com/press/20061011-dell.html"
      },
      {
        "trust": 2.0,
        "url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
      },
      {
        "trust": 2.0,
        "url": "http://securitytracker.com/id?1017075"
      },
      {
        "trust": 2.0,
        "url": "http://securityreason.com/securityalert/1744"
      },
      {
        "trust": 2.0,
        "url": "http://attrition.org/pipermail/vim/2006-october/001085.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/22402"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/4057"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29503"
      },
      {
        "trust": 0.9,
        "url": "http://www.securityfocus.com/archive/1/archive/1/448422/100/100/threaded"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5405"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5405"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/4057"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/29503"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6807/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6806/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/22402/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "PACKETSTORM",
        "id": "50988"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "db": "PACKETSTORM",
        "id": "50988"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-10-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "date": "2006-10-18T00:00:00",
        "db": "BID",
        "id": "87177"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "date": "2006-10-17T17:58:16",
        "db": "PACKETSTORM",
        "id": "50988"
      },
      {
        "date": "2006-10-19T01:07:00",
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "date": "2006-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-21513"
      },
      {
        "date": "2006-10-18T00:00:00",
        "db": "BID",
        "id": "87177"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      },
      {
        "date": "2018-10-17T21:42:46.330000",
        "db": "NVD",
        "id": "CVE-2006-5405"
      },
      {
        "date": "2006-10-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "87177"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Used for multiple products  Toshiba Bluetooth Service disruption in wireless device drivers  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-003320"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-323"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…