Vulnerability Details : CVE-2014-3970
Potential exploit
The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
Vulnerability category: Denial of service
Products affected by CVE-2014-3970
- cpe:2.3:a:pulseaudio:pulseaudio:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:1.99.2:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:1.99.1:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:pulseaudio:pulseaudio:2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3970
0.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3970
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.9
|
LOW | AV:A/AC:M/Au:N/C:N/I:N/A:P |
5.5
|
2.9
|
NIST |
References for CVE-2014-3970
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:134
mandriva.com
-
http://seclists.org/oss-sec/2014/q2/437
oss-sec: Re: CVE request: PulseAudio crash due to empty UDP packet
-
http://secunia.com/advisories/60624
Sign in
-
http://www.securityfocus.com/bid/67814
PulseAudio 'pa_rtp_recv()' Function Remote Denial of Service Vulnerability
-
http://seclists.org/oss-sec/2014/q2/429
oss-sec: CVE request: PulseAudio crash due to empty UDP packet
-
http://lists.freedesktop.org/archives/pulseaudio-discuss/2014-May/020740.html
[pulseaudio-discuss] Remotely triggerable crash in module-rtp-recvExploit
-
http://advisories.mageia.org/MGASA-2014-0440.html
Mageia Advisory: MGASA-2014-0440 - Updated pulseaudio package fixes RTP remote crash vulnerability
Jump to