Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8542-rfhf-wf9j

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.

EPSS

Процентиль: 15%
0.0005
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 18 лет назад

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.

nvd
почти 18 лет назад

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.

debian
почти 18 лет назад

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 bui ...

EPSS

Процентиль: 15%
0.0005
Низкий

Дефекты

CWE-20