CVE-2025-57155
📋 TL;DR
A NULL pointer dereference vulnerability in owntone-server's DAAP service allows remote attackers to crash the service by sending specially crafted requests. This affects all systems running vulnerable versions of owntone-server with DAAP enabled, potentially disrupting media streaming services.
💻 Affected Systems
- owntone-server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service causing owntone-server to crash, disrupting all media streaming services until manual restart.
Likely Case
Service crash requiring restart, causing temporary interruption to media streaming capabilities.
If Mitigated
Minimal impact if service automatically restarts or if DAAP service is disabled.
🎯 Exploit Status
Exploitation requires sending malformed DAAP requests to trigger NULL pointer dereference.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit d857116e4143a500d6a1ea13f4baa057ba3b0028 and later
Vendor Advisory: https://github.com/archersec/security-advisories/blob/master/owntone-server/owntone-server-advisory-2025.md
Restart Required: Yes
Instructions:
1. Update owntone-server to latest version or apply commit d857116e4143a500d6a1ea13f4baa057ba3b0028
2. Restart the owntone-server service
3. Verify the service is running correctly
🔧 Temporary Workarounds
Disable DAAP Service
allDisable the vulnerable DAAP protocol if not required
Edit owntone.conf and set 'daap_port = 0' or 'disable_daap = true'
Restart owntone: sudo systemctl restart owntone
Network Segmentation
linuxRestrict access to DAAP port (3689 by default)
sudo iptables -A INPUT -p tcp --dport 3689 -j DROP
sudo iptables -A INPUT -p udp --dport 3689 -j DROP
🧯 If You Can't Patch
- Implement network controls to restrict access to DAAP port (3689)
- Monitor service health and implement automatic restart mechanisms
🔍 How to Verify
Check if Vulnerable:
Check owntone version: owntone --version or check if running commit before d857116e4143a500d6a1ea13f4baa057ba3b0028
Check Version:
owntone --version 2>/dev/null || grep 'version' /etc/owntone.conf
Verify Fix Applied:
Verify owntone is running commit d857116e4143a500d6a1ea13f4baa057ba3b0028 or later, and service remains stable during DAAP requests
📡 Detection & Monitoring
Log Indicators:
- Segmentation fault errors in owntone logs
- Service crash/restart events
- Unusual DAAP request patterns
Network Indicators:
- Multiple connection attempts to port 3689
- Malformed DAAP protocol packets
SIEM Query:
source="owntone.log" AND ("segmentation fault" OR "SIGSEGV" OR "daap_reply_groups")