hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10208
http://www.vupen.com/english/advisories/2007/0200
http://www.ubuntu.com/usn/usn-413-1
http://www.securityfocus.com/bid/22076
http://www.securityfocus.com/archive/1/455889/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2007-0065.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:014
http://secunia.com/advisories/25264
http://secunia.com/advisories/23879
http://secunia.com/advisories/23798
http://secunia.com/advisories/23747
http://mulliner.org/bluetooth/hidattack.php
http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf