vendor:
PulseAudio
by:
Tavis Ormandy
7,2
CVSS
HIGH
Race Condition
362
CWE
Product Name: PulseAudio
Affected Version From: 0.9.15
Affected Version To: 0.9.21
Patch Exists: YES
Related CWE: CVE-2009-2625
CPE: a:pulseaudio:pulseaudio
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-e9fca207-e399-11de-881e-001aa0166822/, https://www.rapid7.com/db/vulnerabilities/apple-itunes-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0004-2-vma-and-service-console-package-expat-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/vmsa-2012-0001-cve-2009-3560/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1551/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-890-2/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-890-1/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2009-1572/, https://www.rapid7.com/db/vulnerabilities/vmsa-2012-0001-cve-2009-3720/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2009-3720/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0004-2-vma-and-service-console-package-expat-cve-2009-3720/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2009-3720/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-890-5/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-890-3/, https://www.rapid7.com/db/?q=CVE-2009-2625&type=&page=2, https://www.rapid7.com/db/?q=CVE-2009-2625&type=&page=3, https://www.rapid7.com/db/?q=CVE-2009-2625&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
PulseAudio Race Condition Privilege Escalation
This exploit is a race condition vulnerability in PulseAudio, which allows a local user to gain root privileges. The exploit works by creating a hard link to the PulseAudio binary, and then creating a second hard link to a malicious shell script. The exploit then forks a child process, which executes the PulseAudio binary. If the malicious shell script is executed before the PulseAudio binary, the user will gain root privileges.
Mitigation:
Upgrade to the latest version of PulseAudio