Bug 235013 (CVE-2007-1804) - CVE-2007-1804: pulseaudio 0.9.5 DoS
Summary: CVE-2007-1804: pulseaudio 0.9.5 DoS
Keywords:
Status: CLOSED RAWHIDE
Alias: CVE-2007-1804
Product: Fedora
Classification: Fedora
Component: pulseaudio
Version: 6
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Lennart Poettering
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-04-03 11:01 UTC by Ville Skyttä
Modified: 2007-11-30 22:12 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-09-07 10:24:35 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Ville Skyttä 2007-04-03 11:01:31 UTC
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1804

"PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon
crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent
on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a
PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a
length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port
9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote
authenticated users to cause a denial of service (daemon crash) via a crafted
packet on TCP port 9875 that (4) triggers a maxlength assertion failure in
pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6)
plays a certain sound file."

FC5, FC6, devel have 0.9.5 at the moment.

Comment 1 Lennart Poettering 2007-05-28 20:47:38 UTC
PulseAudio 0.9.6 fixes these issues.

Comment 2 Lennart Poettering 2007-09-07 10:23:31 UTC
This has been fixed for quite a while in Rawhide. Since these all are issues
that only trigger an assert() they are quite a low priority. Also, to trigger
them some non-standard modules need to be loaded into the sound server. Thus, I
so no need to provide updates for FC5/FC6.


Note You need to log in before you can comment on or make changes to this bug.