First published: Thu Mar 18 2010(Updated: )
The pa_make_secure_dir function in core-util.c in PulseAudio 0.9.10 and 0.9.19 allows local users to change the ownership and permissions of arbitrary files via a symlink attack on a /tmp/.esd-##### temporary file.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
PulseAudio | =0.9.10 | |
PulseAudio | =0.9.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1299 is categorized as a high severity vulnerability due to its potential for privilege escalation through a symlink attack.
To fix CVE-2009-1299, update PulseAudio to version 0.9.20 or later, which includes the necessary security patches.
The affected versions of PulseAudio in CVE-2009-1299 are 0.9.10 and 0.9.19.
No, CVE-2009-1299 can only be exploited locally by an authenticated user.
CVE-2009-1299 allows an attacker to change ownership and permissions of arbitrary files using a symlink attack.