summaryrefslogtreecommitdiff
blob: d8e3e96f325c6e6fe2135cd4a1abebf3a6b1608f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200704-22">
  <title>BEAST: Denial of Service</title>
  <synopsis>
    A vulnerability has been discovered in BEAST allowing for a Denial of
    Service.
  </synopsis>
  <product type="ebuild">BEAST</product>
  <announced>2007-04-27</announced>
  <revised count="01">2007-04-27</revised>
  <bug>163146</bug>
  <access>local</access>
  <affected>
    <package name="media-sound/beast" auto="yes" arch="*">
      <unaffected range="ge">0.7.1</unaffected>
      <vulnerable range="lt">0.7.1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    BEdevilled Audio SysTem is an audio compositor, supporting a wide range
    of audio formats.
    </p>
  </background>
  <description>
    <p>
    BEAST, which is installed as setuid root, fails to properly check
    whether it can drop privileges accordingly if seteuid() fails due to a
    user exceeding assigned resource limits.
    </p>
  </description>
  <impact type="low">
    <p>
    A local user could exceed his resource limit in order to prevent the
    seteuid() call from succeeding. This may lead BEAST to keep running
    with root privileges. Then, the local user could use the "save as"
    dialog box to overwrite any file on the vulnerable system, potentially
    leading to a Denial of Service.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All BEAST users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=media-sound/beast-0.7.1"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
  </references>
  <metadata tag="requester" timestamp="2007-04-04T08:02:22Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2007-04-04T18:26:01Z">
    p-y
  </metadata>
  <metadata tag="bugReady" timestamp="2007-04-06T18:26:41Z">
    p-y
  </metadata>
</glsa>