CVE-2008-0008
Published: 29 January 2008
The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.
Notes
Author | Note |
---|---|
jdstrand | not possible to exploit in default installation. In fact, need an LSM to fail the call and then not protect the binary properly, so this is almost a non-issue on Ubuntu patched prepared |
Priority
Status
Package | Release | Status |
---|---|---|
pulseaudio Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.9)
|
dapper |
Does not exist
|
|
edgy |
Does not exist
|
|
feisty |
Released
(0.9.5-5ubuntu4.2)
|
|
gutsy |
Released
(0.9.6-1ubuntu2.1)
|
|
Patches: vendor: http://www.debian.org/security/2008/dsa-1476 vendor: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:027 |