aRts: Privilege escalation — GLSA 200606-22

The artswrapper part of aRts allows local users to execute arbitrary code with elevated privileges.

Affected Packages

kde-base/arts on all architectures
Affected versions < 3.5.2-r1
Unaffected versions >= 3.5.2-r1, revision >= 3.4.3-r1

Background

aRts is a real time modular system for synthesizing audio used by KDE. artswrapper is a helper application used to start the aRts daemon.

Description

artswrapper fails to properly check whether it can drop privileges accordingly if setuid() fails due to a user exceeding assigned resource limits.

Impact

Local attackers could exploit this vulnerability to execute arbitrary code with elevated privileges. Note that the aRts package provided by Gentoo is only vulnerable if the artswrappersuid USE-flag is enabled.

Workaround

There is no known workaround at this time.

Resolution

All aRts users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose kde-base/arts

References

Release Date
June 22, 2006

Latest Revision
June 22, 2006: 01

Severity
high

Exploitable
local

Bugzilla entries