First published: Mon Apr 02 2007(Updated: )
PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port 9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote authenticated users to cause a denial of service (daemon crash) via a crafted packet on TCP port 9875 that (4) triggers a maxlength assertion failure in pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6) plays a certain sound file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PulseAudio | =0.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1804 has a high severity level due to its potential to cause a denial of service by crashing the PulseAudio daemon.
To fix CVE-2007-1804, upgrade to a patched version of PulseAudio newer than 0.9.5 that resolves these vulnerabilities.
The impact of CVE-2007-1804 is that it can crash the PulseAudio daemon, leading to service interruptions.
Yes, CVE-2007-1804 can be exploited remotely via specially crafted TCP packets sent to the PulseAudio daemon.
PulseAudio version 0.9.5 is specifically affected by CVE-2007-1804.