First published: Fri Dec 14 2007(Updated: )
The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/0.9.8 | <5. | 5. |
All of | ||
Any of | ||
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Fedora | =7 | |
Fedora | =8 | |
Any of | ||
PulseAudio | =0.9.6 | |
PulseAudio | =0.9.8 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Fedora | =7 | |
Fedora | =8 | |
PulseAudio | =0.9.6 | |
PulseAudio | =0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0008 is considered to have a critical impact as it may allow local users to gain elevated privileges.
To fix CVE-2008-0008, upgrade to PulseAudio version 0.9.9 or later, which addresses the privilege dropping issue.
PulseAudio versions 0.9.8 and 0.9.6 are affected by CVE-2008-0008.
CVE-2008-0008 primarily affects distributions that utilize the vulnerable versions of PulseAudio, such as certain versions of Red Hat and Mandrake Linux.
CVE-2008-0008 is not remote; it requires local access to exploit the privilege escalation vulnerability.