Denial of Service (DoS) Affecting pulseaudio/pulseaudio package, versions [,0.9.5]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
15.12% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-PULSEAUDIOPULSEAUDIO-2379538
  • published26 Jan 2022
  • disclosed2 Apr 2007
  • creditUnknown

Introduced: 2 Apr 2007

CVE-2007-1804  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

There is no fixed version for pulseaudio/pulseaudio.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port 9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote authenticated users to cause a denial of service (daemon crash) via a crafted packet on TCP port 9875 that (4) triggers a maxlength assertion failure in pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6) plays a certain sound file.

CVSS Scores

version 3.1