mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.5 KiB
JSON
77 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2021-28136",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and consequently a crash) in ESP32 via a replayed (duplicated) LMP packet."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/espressif/esp-idf",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/espressif/esp-idf"
|
|
},
|
|
{
|
|
"url": "https://github.com/espressif/esp32-bt-lib",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/espressif/esp32-bt-lib"
|
|
},
|
|
{
|
|
"url": "https://www.espressif.com/en/products/socs/esp32",
|
|
"refsource": "MISC",
|
|
"name": "https://www.espressif.com/en/products/socs/esp32"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://dl.packetstormsecurity.net/papers/general/braktooth.pdf",
|
|
"url": "https://dl.packetstormsecurity.net/papers/general/braktooth.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |