vendor:
PulseAudio
by:
Tavis Ormandy, Julien Tinnes and Yorick Koster
7,2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: PulseAudio
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 9.04 (x86-64) and Slackware 12.2.0 (x86)
2009
PulseAudio setuid Local Privilege Escalation Vulnerability
PulseAudio setuid Local Privilege Escalation Vulnerability is a vulnerability discovered by Tavis Ormandy, Julien Tinnes and Yorick Koster. It allows an attacker to gain root privileges by exploiting a setuid binary in PulseAudio. The exploit was tested with success on Ubuntu 9.04 (x86-64) and Slackware 12.2.0 (x86). The exploit is available for download at https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz).
Mitigation:
The best way to mitigate this vulnerability is to ensure that the PulseAudio setuid binary is not installed on the system. If it is installed, it should be removed or disabled.