nas
Page content
- Author: voroskoi
- Vulnerable: 1.8-1
- Unaffected: 1.8-2terminus1
Luigi Auriemma has reported some vulnerabilities in Network Audio System, which potentially can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service).
- A boundary error within “accept_att_local()” in server/os/connection.c can be exploited to cause a stack-based buffer overflow via an overly long (greater than 64 bytes) slave name in a USL connection. Successful exploitation may allow malicious, local users to gain root privileges.
- An input validation error within “AddResource()” in server/dia/resource.c can be exploited to cause the service to crash via a specially crafted packet with an invalid client ID.
- An integer-overflow error within “ProcAuWriteElement()” in server/dia/audispatch.c can be exploited to cause the service to crash via a specially crafted packet with an overly large max_samples value.
- A boundary error within “ProcAuSetElements()” in server/dia/audispatch.c can be exploited to cause the service to crash via a specially crafted packet with an overly large num_actions or numElements value.
- An input validation error within “compileInputs()” in server/dia/auutil.c can be exploited to cause the service to crash via a specially crafted packet with an invalid element number.
- A NULL-pointer dereference error when processing simultaneous connections can be exploited to cause the service to crash.
- Bug Tracker URL: http://bugs.frugalware.org/task/1843