header-logo
Suggest Exploit
vendor:
SpeechD
by:
7.5
CVSS
HIGH
Command Execution
CWE
Product Name: SpeechD
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Linux

SpeechD Local Command Execution Vulnerability

SpeechD, a device-independent layer for speech synthesis under Linux, is vulnerable to a local command execution flaw. This vulnerability allows a local user to pass malicious commands to the /dev/speech device, which can be executed with the privilege level of the speechd user (usually root). An attacker can exploit this vulnerability by injecting malicious commands using the echo command and redirecting the output to /dev/speech.

Mitigation:

The vendor has not provided a patch or mitigation for this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3326/info

SpeechD is a device-independent layer for speech synthesis under Linux, providing an interface for speech-based applications or device drivers.

SpeechD has been found to contain a flaw under certain implementations which can permit a local user to pass malcious commands to the /dev/speech device, and have them executed with the privilege level of the speechd user, which is usually root. 

echo "';[hostile shell command]" >/dev/speech