Mandriva Linux Security Advisory : pulseaudio (MDVSA-2009:152)

high Nessus Plugin ID 39871

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability has been found and corrected in pulseaudio :

Tavis Ormandy and Julien Tinnes of the Google Security Team discovered that pulseaudio, when installed setuid root, does not drop privileges before re-executing itself to achieve immediate bindings. This can be exploited by a user who has write access to any directory on the file system containing /usr/bin to gain local root access. The user needs to exploit a race condition related to creating a hard link (CVE-2009-1894).

This update provides fixes for this vulnerability.

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 39871

File Name: mandriva_MDVSA-2009-152.nasl

Version: 1.16

Type: local

Published: 7/20/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64pulseaudio-devel, p-cpe:/a:mandriva:linux:lib64pulseaudio0, p-cpe:/a:mandriva:linux:lib64pulsecore5, p-cpe:/a:mandriva:linux:lib64pulseglib20, p-cpe:/a:mandriva:linux:lib64pulsezeroconf0, p-cpe:/a:mandriva:linux:libpulseaudio-devel, p-cpe:/a:mandriva:linux:libpulseaudio0, p-cpe:/a:mandriva:linux:libpulsecore5, p-cpe:/a:mandriva:linux:libpulseglib20, p-cpe:/a:mandriva:linux:libpulsezeroconf0, p-cpe:/a:mandriva:linux:pulseaudio, p-cpe:/a:mandriva:linux:pulseaudio-esound-compat, p-cpe:/a:mandriva:linux:pulseaudio-module-bluetooth, p-cpe:/a:mandriva:linux:pulseaudio-module-gconf, p-cpe:/a:mandriva:linux:pulseaudio-module-jack, p-cpe:/a:mandriva:linux:pulseaudio-module-lirc, p-cpe:/a:mandriva:linux:pulseaudio-module-x11, p-cpe:/a:mandriva:linux:pulseaudio-module-zeroconf, p-cpe:/a:mandriva:linux:pulseaudio-utils, cpe:/o:mandriva:linux:2008.1, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/17/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1894

CWE: 362

MDVSA: 2009:152