openSUSE Security Update : libpulse-browse0 (libpulse-browse0-2131)

medium Nessus Plugin ID 45103

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

Due to a race condition in pulseaudio a local attacker could make pulseaudio change ownership and permissions of arbitrary files. The problem is only security relevant if pulseaudio is run in 'system mode' which is not the case by default (CVE-2009-1299).

This update also improves some latency problems with pulseaudio.

Solution

Update the affected libpulse-browse0 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=555689

https://bugzilla.novell.com/show_bug.cgi?id=584938

Plugin Details

Severity: Medium

ID: 45103

File Name: suse_11_2_libpulse-browse0-100312.nasl

Version: 1.8

Type: local

Agent: unix

Published: 3/19/2010

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:pulseaudio-module-zeroconf, p-cpe:/a:novell:opensuse:pulseaudio-esound-compat, cpe:/o:novell:opensuse:11.2, p-cpe:/a:novell:opensuse:libpulse-browse0, p-cpe:/a:novell:opensuse:pulseaudio, p-cpe:/a:novell:opensuse:pulseaudio-module-gconf, p-cpe:/a:novell:opensuse:pulseaudio-module-bluetooth, p-cpe:/a:novell:opensuse:pulseaudio-utils, p-cpe:/a:novell:opensuse:libpulse-mainloop-glib0, p-cpe:/a:novell:opensuse:pulseaudio-gdm-hooks, p-cpe:/a:novell:opensuse:pulseaudio-module-jack, p-cpe:/a:novell:opensuse:libpulse0, p-cpe:/a:novell:opensuse:pulseaudio-module-lirc, p-cpe:/a:novell:opensuse:pulseaudio-module-x11, p-cpe:/a:novell:opensuse:libpulse0-32bit, p-cpe:/a:novell:opensuse:pulseaudio-lang, p-cpe:/a:novell:opensuse:libpulse-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/12/2010

Reference Information

CVE: CVE-2009-1299