Gentoo Logo

BEAST: Denial of Service


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200704-22 / BEAST
Release Date April 27, 2007
Latest Revision April 27, 2007: 01
Impact low
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
media-sound/beast < 0.7.1 >= 0.7.1 All supported architectures

Related bugreports: #163146


A vulnerability has been discovered in BEAST allowing for a Denial of Service.

2.  Impact Information


BEdevilled Audio SysTem is an audio compositor, supporting a wide range of audio formats.


BEAST, which is installed as setuid root, fails to properly check whether it can drop privileges accordingly if seteuid() fails due to a user exceeding assigned resource limits.


A local user could exceed his resource limit in order to prevent the seteuid() call from succeeding. This may lead BEAST to keep running with root privileges. Then, the local user could use the "save as" dialog box to overwrite any file on the vulnerable system, potentially leading to a Denial of Service.

3.  Resolution Information


There is no known workaround at this time.


All BEAST users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/beast-0.7.1"

4.  References


Page updated April 27, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.