Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Beep2 Vendors:   Shingo
Beep2 Tone Generator for UNIX/Linux Operating Systems Allows Local Users to View Files on the System with Root Privileges
SecurityTracker Alert ID:  1003271
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 17 2002
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0 - 1.2
Description:   Shadow Penguin Security issued an advisory regarding a vulnerability in the 'beep2' audio application. A local user can use the application to view files on the system with root level privileges.

It is reported that beep2 is configured with set user id (suid) 'root' permissions. A local user can use the program to view files on the system.

Impact:   A local user can view files on the system with root level privileges.
Solution:   The vendor has released a fixed version (1.2a), available at the Vendor URL or at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Subject:  beep2 allows reading of non-permitted fil

>From Shadow Penguin Security Advisory #45

beep2 accepts frequency (or score) and length from stdin or text file
and translates to beep sounds, this is included in Linux distribution
such as Kondara MNU/Linux2.0. beep2 displays the line of file if parse
error happens. beep2 is the suid program which owner is root, so, beep2
allows reading of non-permitted files such as e-mail files for other
users or some important files for system security.


not vulnerable

> 2002/01/10 version 1.2a released. Security hole fixed.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC