{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0204","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2026-04-15T21:09:47.949Z","dateReserved":"2022-01-12T00:00:00.000Z","datePublished":"2022-03-09T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-10-24T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service."}],"affected":[{"vendor":"n/a","product":"bluez","versions":[{"version":"bluez versions prior to 5.63","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039807"},{"url":"https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q"},{"url":"https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0"},{"name":"GLSA-202209-16","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202209-16"},{"name":"[debian-lts-announce] 20221024 [SECURITY] [DLA 3157-1] bluez security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119","cweId":"CWE-119"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039807","tags":["x_transferred"]},{"url":"https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q","tags":["x_transferred"]},{"url":"https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0","tags":["x_transferred"]},{"name":"GLSA-202209-16","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202209-16"},{"name":"[debian-lts-announce] 20221024 [SECURITY] [DLA 3157-1] bluez security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00022.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T16:09:28.899Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"ADJACENT_NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-04-15T21:09:36.081426Z","id":"CVE-2022-0204","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T21:09:47.949Z"}}]}}