[NT] WIDCOMM Bluetooth Connectivity Software Buffer Overflows

From: SecuriTeam (support_at_securiteam.com)
Date: 08/11/04

  • Next message: SecuriTeam: "[NT] Sygate Secure Enterprise Replay Attack"
    To: list@securiteam.com
    Date: 11 Aug 2004 17:42:26 +0200

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.

    - - - - - - - - -

      WIDCOMM Bluetooth Connectivity Software Buffer Overflows


    WIDCOMM's products provides a full range of Bluetooth connectivity
    solutions for PCs, PDAs, mobile phones, headsets, digital cameras, access
    points, and various output devices.

    An unauthenticated remote attacker can submit various malformed service
    requests via Bluetooth, triggering a buffer overflow and executing
    arbitrary code on the vulnerable device.

    On Windows platforms this allows arbitrary code execution under the
    context of the currently logged on user account.


    Vulnerable Systems:
     * BTStackServer version
     * BTStackServer version
     * BTStackServer version

    WIDCOMM supply their Bluetooth Communications software to other companies
    to allow them to integrate Bluetooth technology into their devices. They
    also supply Bluetooth SDK's to enable developers to create applications
    that use Bluetooth. Therefore it may not be immediately apparent that you
    are using the WIDCOMM Bluetooth software and version numbers may vary.

     <http://www.widcomm.com/Partners/index.asp> WIDCOMM's website reports the
    following companies as customers or partners with WIDCOMM:
    Logitech Samsung Electro-Mechanics Sony Texas Instruments Compaq Computer
    Corporation Dell National Semiconductor Matsushita Electric Industrial
    Co., Ltd. Wistron NeWeb Corporation TDK Systems Europe Zeevo Cambridge
    Silicon Radio Billionton Broadcom Corporation LG Innotek MSI Fujitsu
    Siemens Computers Philips Silicon Wave Seiko Instruments Inc. TECOM
    Plantronics Mobilian Fujitsu Media Devices Limited OKI Electric Industry
    Co. Ltd. FIC Costar Brother Alcatel Atmel Conexant Systems, Inc. Microtune

    Pentest Limited has tested for the reported vulnerabilities against
    BTStackServer version and on both Windows XP and Windows
    98 that ships with MSI Bluetooth Dongles. We have also tested this against
    an HP IPAQ 5450 running WinCE 3.0 with Bluetooth software version

    Whilst the above platforms are the only platforms tested and confirmed to
    be exploitable by Pentest Limited, discussions with the vendor lead us to
    believe that are all versions prior to version BTW & BT-CE/PPC 3.0 are
    affected by this vulnerability.

    CVE Information:

    Vendor Status:
    14-11-2003 - Initial Pentest Limited Notification
    14-11-2003 - Notification acknowledged by WIDCOMM, request more detail
    20-11-2003 - Pentest notify WIDCOMM of another vulnerability
    06-01-2004 - Pentest send chase up Email without reply
    13-01-2004 - Another email
    13-01-2004 - WIDCOMM reply saying they are still working on it
    21-01-2004 - Pentest email WIDCOMM that they have written a POC exploit
    23-01-2004 - WIDCOMM reply saying they have resolved issue and fix will be
    available in next release
    10-02-2004 - Pentest ask for an update on expected release date
    11-02-2004 - WIDCOMM plan February/early March release date
    29-03-2004 - Pentest ask for update
    12-05-2004 - Pentest ask for update
    12-07-2004 - Pentest send chase up Email without reply
    26-07-2004 - Pentest ask whether a patch will be released for older
    03-08-2004 - WIDCOMM respond. No date set for new release and no patch
    will be made available for older versions.

    Until version 3 of the WIDCOMM software becomes available from WIDCOMM or
    their customers/partners Pentest Limited recommend that end users stop
    using the vulnerable WIDCOMM Bluetooth software or set their Bluetooth
    device configuration to be non-discoverable or hidden. This will not stop
    the device from being vulnerable but it may limit the exposure.


    The information has been provided by Mark Rowe and Matt Moore.
    The original article can be found at:


    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

  • Next message: SecuriTeam: "[NT] Sygate Secure Enterprise Replay Attack"

    Relevant Pages