motorola pebl_u6 Security Vulnerabilities

3 Vulnerabilities
Description

Buffer overflow in the Motorola PEBL U6 08.83.76R, and possibly other Motorola P2K-based phones, allows remote attackers to cause a denial of service (device shutdown), and possibly execute arbitrary code, via a long OBEX setpath to the OBEX File Transfer (aka FTP) service on Bluetooth channel 9.~Arbitrary code execution may also be possible, but has not been confirmed. This vulnerability may affect other versions of Motorola P2K-based phones.

Impacted versions: u6

Base Score: 7.8, Severity: HIGH, ID: CVE-2006-1366, Last Modified: 2018-10-18T16:32:00Z

References

Exploit Exploit Broken Link

The Motorola PEBL U6, the Motorola V600, and possibly the Motorola E398 and other Motorola phones allow remote attackers to add an entry for their own Bluetooth device to a target device's list of trusted devices (aka Device History), and possibly obtain AT level access to the target device, by initiating and interrupting an OBEX Push Profile that pretends to send a vCard, aka a "HeloMoto" attack.

Impacted versions: 08.83.76r

Base Score: 5.0, Severity: MEDIUM, ID: CVE-2006-1365, Last Modified: 2018-10-18T16:32:00Z

References

Exploit Broken Link

The Motorola PEBL U6 08.83.76R, the Motorola V600, and possibly the Motorola E398 and other Motorola P2K-based phones does not require pairing for a connection related to the Headset Audio Gateway service, which allows user-assisted remote attackers to obtain AT level access and view phonebook entries and saved SMS messages by connecting on Bluetooth channel 3 and tricking the user into pressing Grant, aka a "Blueline" attack. NOTE: while user-assisted, the attack is made more feasible because of a GUI misrepresentation issue that allows a default message to be replaced by an attacker-specified one.

Impacted versions: u6_08.83.76r

Base Score: 6.8, Severity: MEDIUM, ID: CVE-2006-1367, Last Modified: 2018-10-18T16:32:00Z

References

Vendor Advisory Broken Link Exploit Vendor Advisory
Free Home-Networking Courses, tutorials and security checklists

USAGE: Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.