[SA15874] NetBSD Audio Drivers ioctl Denial of Service Vulnerability

2005-07-02T00:00:00
ID SECURITYVULNS:DOC:9046
Type securityvulns
Reporter Securityvulns
Modified 2005-07-02T00:00:00

Description


Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/


TITLE: NetBSD Audio Drivers ioctl Denial of Service Vulnerability

SECUNIA ADVISORY ID: SA15874

VERIFY ADVISORY: http://secunia.com/advisories/15874/

CRITICAL: Not critical

IMPACT: DoS

WHERE: Local system

OPERATING SYSTEM: NetBSD 1.x http://secunia.com/product/255/

DESCRIPTION: A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to a division by zero error in certain audio drivers when processing an "ioctl()" call that contains both the "unpaused" command and the block-size change information.

Successful exploitation crashes the kernel, but requires access to the audio device.

The vulnerability has been reported in the "clcs" and "emuxki" drivers for the Cirrus Logic CS4280/CS4281, SB Live!, and SB PC 512 hardware.

SOLUTION: The vulnerability has been fixed in the following versions: * NetBSD-current (June 12, 2005) * NetBSD-1.6 branch (June 17, 2005, 1.6.3 will include the fix)

PROVIDED AND/OR DISCOVERED BY: The vendor credits Ignatios Souvatzis and Yamamoto Takashi.

ORIGINAL ADVISORY: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-002.txt.asc


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.