CVE-2025-63648

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in owntone-server's DACP handling allows attackers to crash the service by sending a specially crafted request. This affects systems running vulnerable versions of owntone-server, potentially disrupting music streaming services.

💻 Affected Systems

Products:
  • owntone-server
Versions: Versions before commit 5f526c7a7e08c567a5c72421d74a79dafdd07621
Operating Systems: Linux, macOS, FreeBSD
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where DACP service is enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage requiring manual restart, disrupting all music streaming functionality.

🟠

Likely Case

Service crash causing temporary interruption until automatic or manual restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and recovery.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the DACP service port (default 3689).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 5f526c7a7e08c567a5c72421d74a79dafdd07621 or later

Vendor Advisory: https://github.com/archersec/security-advisories/blob/master/owntone-server/owntone-server-advisory-2025.md

Restart Required: Yes

Instructions:

1. Update owntone-server to latest version
2. Pull latest changes from GitHub repository
3. Rebuild and restart the service

🔧 Temporary Workarounds

Block DACP Port

linux

Block access to DACP service port to prevent exploitation

sudo iptables -A INPUT -p tcp --dport 3689 -j DROP
sudo iptables -A INPUT -p udp --dport 3689 -j DROP

Disable DACP Service

all

Disable DACP functionality in configuration

Edit configuration to set 'disable-dacp = true'

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to owntone-server
  • Deploy intrusion detection systems to monitor for DACP exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if running version before commit 5f526c7a7e08c567a5c72421d74a79dafdd07621

Check Version:

owntone --version or check git commit hash

Verify Fix Applied:

Verify current commit includes 5f526c7a7e08c567a5c72421d74a79dafdd07621 or later

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in logs
  • Unexpected service restarts
  • DACP request parsing errors

Network Indicators:

  • Multiple rapid DACP requests to port 3689
  • Malformed DACP packets

SIEM Query:

source="owntone.log" AND ("segmentation fault" OR "SIGSEGV" OR "null pointer")

🔗 References

📤 Share & Export