Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18750 - Vendor Advisory | |
References | () http://securitytracker.com/id?1015599 - | |
References | () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=381 - Vendor Advisory | |
References | () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=382 - Vendor Advisory | |
References | () http://www.osvdb.org/22964 - | |
References | () http://www.osvdb.org/22965 - | |
References | () http://www.securityfocus.com/bid/16539 - | |
References | () http://www.vupen.com/english/advisories/2006/0474 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24557 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24558 - |
Information
Published : 2006-02-09 02:02
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0619
Mitre link : CVE-2006-0619
CVE.ORG link : CVE-2006-0619
JSON object : View
Products Affected
qnx
- rtos
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer