发布时间 :2005-07-05 00:00:00
修订时间 :2008-09-10 15:41:07

[原文]The (1) clcs and (2) emuxki drivers in NetBSD 1.6 through 2.0.2 allow local users to cause a denial of service (kernel crash) by using the set-parameters ioctl on an audio device to change the block size and set the pause state to "unpaused" in the same ioctl, which causes a divide-by-zero error.

[CNNVD]NetBSD clcs/emuxki 拒绝服务漏洞(CNNVD-200507-044)

        NetBSD 1.6至2.0.2中存在拒绝服务漏洞。
        本地用户可利用clcs和emuxki驱动程序,在音频设备上使用set-parameters ioctl更改区块大小,并在相同ioctl中将暂停状态设置为"取消暂停",这会导致除数为零的错误,使得系统内核崩溃,产生拒绝服务。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:netbsd:netbsd:2.0NetBSD 2.0
cpe:/o:netbsd:netbsd:1.6.1NetBSD 1.6.1
cpe:/o:netbsd:netbsd:2.0.2NetBSD 2.0.2
cpe:/o:netbsd:netbsd:2.0.1NetBSD 2.0.1
cpe:/o:netbsd:netbsd:1.6NetBSD 1.6
cpe:/o:netbsd:netbsd:1.6.2NetBSD 1.6.2

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

NetBSD clcs/emuxki 拒绝服务漏洞
低危 未知
2005-07-05 00:00:00 2005-10-20 00:00:00
        NetBSD 1.6至2.0.2中存在拒绝服务漏洞。
        本地用户可利用clcs和emuxki驱动程序,在音频设备上使用set-parameters ioctl更改区块大小,并在相同ioctl中将暂停状态设置为"取消暂停",这会导致除数为零的错误,使得系统内核崩溃,产生拒绝服务。

- 公告与补丁


- 漏洞信息

NetBSD Multiple Audio Driver Malformed ioctl() Call Local DoS
Local Access Required Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

NetBSD contains a flaw that may allow a local denial of service. The issue is triggered when a malicious attacker uses the set-parameters ioctl call on certain audio devices to change block size and set pause state to "unpaused" in the same ioctl, which will cause a divide-by-zero error resulting in loss of availability for the platform.

- 时间线

2005-06-30 Unknow
2005-06-30 Unknow

- 解决方案

Upgrade to version 2.0.3 or 2.0.2 after the correction date, as it has been reported to fix this vulnerability. In addition, NetBSD has released a patch for some older versions. It is also possible to correct the flaw by implementing the following workaround: disable access to the audio device for all users. Execute the following commands as root: chown root /dev/audio* /dev/audioctl* /dev/sound* chmod 000 /dev/audio* /dev/audioctl* /dev/sound*

- 相关参考

- 漏洞作者