The contact tracing mobile Apps are one of the many initiatives to fight the COVID-19 virus. These Apps use the Exposure Notification (EN) system available on Google and Apple's operating systems. However, contact tracing applications depend on the availability of Bluetooth interfaces to exchange proximity identifiers that, if compromised, directly impact the effectiveness of the apps. This paper discloses and details the Advertising Overflow attack, a novel internal Denial of Service (DoS) attack targeting the EN system on Android Operating System (OS) devices. The attack is performed by a malicious App that occupies all the Bluetooth advertising slots in an Android device, effectively blocking any advertising attempt of EN. The impact of the disclosed attack and other already disclosed DoSbased attacks, namely Battery Exhaustion and Storage Drain, was tested using two target smartphones and other six smartphones as attackers. The results show that the Battery Exhaustion attack imposes a battery discharge rate 1.95 times superior to the baseline. Regarding the Storage Drain, the storage usage increased more than 30 times the baseline results. The results of the novel attack reveals that a malicious App is able to block the usage of Bluetooth advertising by any other App by any chosen time period, canceling the operation of the EN system and compromising the efficiency of any COVID's contact tracing App based on EN.