CVE-2007-1804
PulseAudio 0.9.5 - 'Assert()' Remote Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port 9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote authenticated users to cause a denial of service (daemon crash) via a crafted packet on TCP port 9875 that (4) triggers a maxlength assertion failure in pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6) plays a certain sound file.
PulseAudio 0.9.5 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante (1) un valor PA_PSTREAM_DESCRIPTOR_LENGTH de FRAME_SIZE_MAX_ALLOW enviado al puerto TCP 9875, que dispara un fallo de aserción p->exportar en do_read; (2) un valor PA_PSTREAM_DESCRIPTOR_LENGTH de 0 enviado al puerto TCP 9875, lo cual dispara un fallo de aserción de longitud en pa_memblock_new; o (3) un paquete UDP vacío al puerto 9875, lo cual dispara un fallo de aserción t en pa_sdp_parse; y permite a usuarios autenticados remotamente provocar una denegación de servicio (caída del demonio) mediante un paquete manipulado al puerto TCP 9875 que dispara un fallo de aserción de longitud máxima (maxlength) en pa_memblockq_new, (5) dispara un fallo de aserción de tamaño en pa_xmalloc, o (6) reproduce un determinado archivo de sonido.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-04-02 CVE Reserved
- 2007-04-02 CVE Published
- 2007-04-02 First Exploit
- 2024-08-07 CVE Updated
- 2024-10-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://aluigi.org/poc/pulsex.zip | X_refsource_misc | |
http://secunia.com/advisories/25431 | Third Party Advisory | |
http://secunia.com/advisories/25787 | Third Party Advisory | |
http://www.securityfocus.com/bid/23240 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/1214 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33315 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29809 | 2007-04-02 |
URL | Date | SRC |
---|---|---|
http://aluigi.altervista.org/adv/pulsex-adv.txt | 2017-07-29 |
URL | Date | SRC |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2008:065 | 2017-07-29 | |
http://www.novell.com/linux/security/advisories/2007_13_sr.html | 2017-07-29 | |
http://www.ubuntu.com/usn/usn-465-1 | 2017-07-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pulseaudio Search vendor "Pulseaudio" | Pulseaudio Search vendor "Pulseaudio" for product "Pulseaudio" | 0.9.5 Search vendor "Pulseaudio" for product "Pulseaudio" and version "0.9.5" | - |
Affected
|