发布时间 :2006-05-05 08:46:00
修订时间 :2013-09-05 00:53:48

[原文]The audio_write function in NetBSD 3.0 allows local users to cause a denial of service (kernel crash) by using the audiosetinfo ioctl to change the sample rate of an audio device.

[CNNVD]NetBSD Audiosetinfo IOCTL 本地拒绝服务漏洞(CNNVD-200605-111)

        NetBSD 3.0中的audio_write函数可以使本地用户利用audiosetinfo ioctl改变音频设备的取样率,造成拒绝服务(内核崩溃)。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  SECTRACK  1016004
(PATCH)  NETBSD  NetBSD-SA2006-014
(UNKNOWN)  BID  17999

- 漏洞信息

NetBSD Audiosetinfo IOCTL 本地拒绝服务漏洞
低危 其他
2006-05-05 00:00:00 2006-05-05 00:00:00
        NetBSD 3.0中的audio_write函数可以使本地用户利用audiosetinfo ioctl改变音频设备的取样率,造成拒绝服务(内核崩溃)。

- 公告与补丁


- 漏洞信息

NetBSD audio_write() Filter List Modification Local DoS
Local Access Required Denial of Service
Loss of Availability

- 漏洞描述

NetBSD contains a flaw that may allow a local denial of service. The issue is triggered when a malicious user changes the sample rate of an audio device during playback, and will result in loss of availability for the platform.

- 时间线

2006-04-27 Unknow
Unknow Unknow

- 解决方案

Update from CVS, re-build, and re-install the kernel: # cd src # cvs update -d -P sys/dev/audio.c # cvs update -d -P sys/dev/audio_if.h # cvs update -d -P sys/dev/audiovar.h # ./ kernel=KERNCONF # mv /netbsd /netbsd.old # cp sys/arch/ARCH/compile/obj/KERNCONF/netbsd /netbsd # shutdown -r now

- 相关参考

- 漏洞作者

- 漏洞信息

NetBSD Audiosetinfo IOCTL Local Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 17999
No Yes
2006-04-19 12:00:00 2006-05-17 07:24:00
The vendor credits Christian Biere with the discovery of this issue.

- 受影响的程序版本

Navision Financials Server 3.0

- 漏洞讨论

NetBSD is prone to a local denial-of-service vulnerability.

Specifically, the issue presents itself if a user changes the sample rate of an audio device during playback.

A successful attack may trigger a crash in the kernel.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 解决方案

NetBSD has released an advisory to address this issue. Please see the referenced advisory for details on updating affected kernels.

- 相关参考