mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.5 KiB
JSON
77 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2021-28139",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/espressif/esp-idf",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/espressif/esp-idf"
|
|
},
|
|
{
|
|
"url": "https://github.com/espressif/esp32-bt-lib",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/espressif/esp32-bt-lib"
|
|
},
|
|
{
|
|
"url": "https://www.espressif.com/en/products/socs/esp32",
|
|
"refsource": "MISC",
|
|
"name": "https://www.espressif.com/en/products/socs/esp32"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://dl.packetstormsecurity.net/papers/general/braktooth.pdf",
|
|
"url": "https://dl.packetstormsecurity.net/papers/general/braktooth.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |