ID |
CVE-2006-1365
|
Summary |
The Motorola PEBL U6, the Motorola V600, and possibly the Motorola E398 and other Motorola phones allow remote attackers to add an entry for their own Bluetooth device to a target device's list of trusted devices (aka Device History), and possibly obtain AT level access to the target device, by initiating and interrupting an OBEX Push Profile that pretends to send a vCard, aka a "HeloMoto" attack. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:h:motorola:e398:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:e398:*:*:*:*:*:*:*:*
-
cpe:2.3:h:motorola:pebl_u6:08.83.76r:*:*:*:*:*:*:*
cpe:2.3:h:motorola:pebl_u6:08.83.76r:*:*:*:*:*:*:*
-
cpe:2.3:h:motorola:v600:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:v600:*:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 18-10-2018 - 16:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bugtraq | 20060321 DMA[2006-0321a] - 'Motorola P2K Platform setpath() overflow and Blueline attack' | misc | |
|
Last major update |
18-10-2018 - 16:32 |
Published |
23-03-2006 - 23:06 |
Last modified |
18-10-2018 - 16:32 |