blob: 582453011d9eb147e8954336795360652299d962 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200704-22">
<title>BEAST: Denial of Service</title>
A vulnerability has been discovered in BEAST allowing for a Denial of
<product type="ebuild">BEAST</product>
<announced>April 27, 2007</announced>
<revised>April 27, 2007: 01</revised>
<package name="media-sound/beast" auto="yes" arch="*">
<unaffected range="ge">0.7.1</unaffected>
<vulnerable range="lt">0.7.1</vulnerable>
BEdevilled Audio SysTem is an audio compositor, supporting a wide range
of audio formats.
BEAST, which is installed as setuid root, fails to properly check
whether it can drop privileges accordingly if seteuid() fails due to a
user exceeding assigned resource limits.
<impact type="low">
A local user could exceed his resource limit in order to prevent the
seteuid() call from succeeding. This may lead BEAST to keep running
with root privileges. Then, the local user could use the "save as"
dialog box to overwrite any file on the vulnerable system, potentially
leading to a Denial of Service.
There is no known workaround at this time.
All BEAST users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-sound/beast-0.7.1&quot;</code>
<uri link="">CVE-2006-2916</uri>
<uri link="">CVE-2006-4447</uri>
<metadata tag="requester" timestamp="Wed, 04 Apr 2007 08:02:22 +0000">
<metadata tag="submitter" timestamp="Wed, 04 Apr 2007 18:26:01 +0000">
<metadata tag="bugReady" timestamp="Fri, 06 Apr 2007 18:26:41 +0000">