First published: Wed Jan 22 2020(Updated: )
The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Tizen | =1.0 | |
Linux Tizen | =1.0-m1 | |
Linux Tizen | =2.0 | |
Linux Tizen | =2.1 | |
Linux Tizen | =2.2 | |
Linux Tizen | =2.2.1 | |
Linux Tizen | =2.3 | |
Linux Tizen | =2.3.1 | |
Linux Tizen | =2.4 | |
Linux Tizen | =3.0 | |
Linux Tizen | =3.0-m2 | |
Linux Tizen | =3.0-m3 | |
Linux Tizen | =4.0-m1 | |
Linux Tizen | =4.0-m2 | |
Linux Tizen | =4.0-m3 | |
Linux Tizen | =5.0 | |
Samsung Galaxy Gear |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-16263.
The severity of CVE-2018-16263 is high with a severity value of 8.8.
Linux Tizen versions before 5.0 M1 and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2 are affected by CVE-2018-16263.
CVE-2018-16263 allows an unprivileged process to control the A2DP MediaEndpoint of the PulseAudio system service in Tizen, leading to unauthorized control of audio streaming.
Yes, you can find references for CVE-2018-16263 at the following links: [1] [2] [3].