Search criteria
8 vulnerabilities found for bluetooth_stack by toshiba
CVE-2015-0884 (GCVE-0-2015-0884)
Vulnerability from nvd – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.427Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031825"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-03-19T15:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031825"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0884",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.support.toshiba.com/sscontent?contentId=4007187",
"refsource": "CONFIRM",
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031825"
},
{
"name": "http://www.support.toshiba.com/sscontent?contentId=4007185",
"refsource": "CONFIRM",
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"name": "http://jvn.jp/vu/JVNVU99205169/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0884",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.427Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5611 (GCVE-0-2006-5611)
Vulnerability from nvd – Published: 2006-10-31 00:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:55:53.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5611",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook",
"refsource": "CONFIRM",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5611",
"datePublished": "2006-10-31T00:00:00",
"dateReserved": "2006-10-30T00:00:00",
"dateUpdated": "2024-08-07T19:55:53.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3146 (GCVE-0-2006-3146)
Vulnerability from nvd – Published: 2006-06-22 22:00 – Updated: 2024-08-07 18:16
VLAI?
Summary
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:16:05.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-2455",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"tags": [
"mailing-list",
"x_refsource_VIM",
"x_transferred"
],
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016345"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/26686"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18527"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-06-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-2455",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"tags": [
"mailing-list",
"x_refsource_VIM"
],
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016345"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/26686"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18527"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3146",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-2455",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"name": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html",
"refsource": "MISC",
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016345"
},
{
"name": "http://trifinite.org/trifinite_advisory_toshiba.html",
"refsource": "MISC",
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26686"
},
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
"refsource": "CONFIRM",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18527"
},
{
"name": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html",
"refsource": "MISC",
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3146",
"datePublished": "2006-06-22T22:00:00",
"dateReserved": "2006-06-22T00:00:00",
"dateUpdated": "2024-08-07T18:16:05.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0212 (GCVE-0-2006-0212)
Vulnerability from nvd – Published: 2006-01-14 01:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:25:34.002Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18437"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015486"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18437"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015486"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0212",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
"refsource": "MISC",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18437"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015486"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0212",
"datePublished": "2006-01-14T01:00:00",
"dateReserved": "2006-01-14T00:00:00",
"dateUpdated": "2024-08-07T16:25:34.002Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0884 (GCVE-0-2015-0884)
Vulnerability from cvelistv5 – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.427Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031825"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-03-19T15:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031825"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0884",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.support.toshiba.com/sscontent?contentId=4007187",
"refsource": "CONFIRM",
"url": "http://www.support.toshiba.com/sscontent?contentId=4007187"
},
{
"name": "1031825",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031825"
},
{
"name": "http://www.support.toshiba.com/sscontent?contentId=4007185",
"refsource": "CONFIRM",
"url": "http://www.support.toshiba.com/sscontent?contentId=4007185"
},
{
"name": "VU#632140",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/632140"
},
{
"name": "http://jvn.jp/vu/JVNVU99205169/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/vu/JVNVU99205169/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0884",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.427Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5611 (GCVE-0-2006-5611)
Vulnerability from cvelistv5 – Published: 2006-10-31 00:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:55:53.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5611",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) \"Security fix.\" NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook",
"refsource": "CONFIRM",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook"
},
{
"name": "toshiba-bluetooth-unspecified(44391)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44391"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5611",
"datePublished": "2006-10-31T00:00:00",
"dateReserved": "2006-10-30T00:00:00",
"dateUpdated": "2024-08-07T19:55:53.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3146 (GCVE-0-2006-3146)
Vulnerability from cvelistv5 – Published: 2006-06-22 22:00 – Updated: 2024-08-07 18:16
VLAI?
Summary
The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:16:05.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-2455",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"tags": [
"mailing-list",
"x_refsource_VIM",
"x_transferred"
],
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016345"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/26686"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18527"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-06-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-2455",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"tags": [
"mailing-list",
"x_refsource_VIM"
],
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016345"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/26686"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18527"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3146",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to \"Ping o\u0027 Death\" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-2455",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2455"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "toshiba-bluetooth-dos(27228)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27228"
},
{
"name": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html",
"refsource": "MISC",
"url": "http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html"
},
{
"name": "20657",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20657"
},
{
"name": "1016345",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016345"
},
{
"name": "http://trifinite.org/trifinite_advisory_toshiba.html",
"refsource": "MISC",
"url": "http://trifinite.org/trifinite_advisory_toshiba.html"
},
{
"name": "20060620 trifinite Security Advisory: Buffer Overrun in Toshiba Bluetooth Stack for Windows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437811/100/0/threaded"
},
{
"name": "26686",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26686"
},
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
"refsource": "CONFIRM",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "18527",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18527"
},
{
"name": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html",
"refsource": "MISC",
"url": "http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3146",
"datePublished": "2006-06-22T22:00:00",
"dateReserved": "2006-06-22T00:00:00",
"dateUpdated": "2024-08-07T18:16:05.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0212 (GCVE-0-2006-0212)
Vulnerability from cvelistv5 – Published: 2006-01-14 01:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:25:34.002Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18437"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015486"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18437"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015486"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0212",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421993/100/0/threaded"
},
{
"name": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2",
"refsource": "MISC",
"url": "http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"
},
{
"name": "16236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16236"
},
{
"name": "ADV-2006-0184",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0184"
},
{
"name": "18437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18437"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"
},
{
"name": "22380",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22380"
},
{
"name": "20060113 DMA[2006-0112a] - \u0027Toshiba Bluetooth Stack Directory Transversal\u0027",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=113712413907526\u0026w=2"
},
{
"name": "1015486",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015486"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0212",
"datePublished": "2006-01-14T01:00:00",
"dateReserved": "2006-01-14T00:00:00",
"dateUpdated": "2024-08-07T16:25:34.002Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}