CVE-2006-0619

Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qnx:rtos:6.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://secunia.com/advisories/18750 - Vendor Advisory () http://secunia.com/advisories/18750 - Vendor Advisory
References () http://securitytracker.com/id?1015599 - () http://securitytracker.com/id?1015599 -
References () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=381 - Vendor Advisory () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=381 - Vendor Advisory
References () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=382 - Vendor Advisory () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=382 - Vendor Advisory
References () http://www.osvdb.org/22964 - () http://www.osvdb.org/22964 -
References () http://www.osvdb.org/22965 - () http://www.osvdb.org/22965 -
References () http://www.securityfocus.com/bid/16539 - () http://www.securityfocus.com/bid/16539 -
References () http://www.vupen.com/english/advisories/2006/0474 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0474 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24557 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24557 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24558 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24558 -

Information

Published : 2006-02-09 02:02

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0619

Mitre link : CVE-2006-0619

CVE.ORG link : CVE-2006-0619


JSON object : View

Products Affected

qnx

  • rtos
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer