Show plain JSON{"id": "CVE-2011-4060", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.3, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-10-18T01:55:01.280", "references": [{"url": "http://securityreason.com/securityalert/8475", "source": "cve@mitre.org"}, {"url": "http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/71784", "source": "cve@mitre.org"}, {"url": "http://www.qnx.com/developers/articles/rel_5189_46.html", "source": "cve@mitre.org"}, {"url": "http://www.qnx.com/developers/docs/6.5.0_sp1/index.jsp?topic=%2Fcom.qnx.doc.momentics_release_notes%2Frel_6.5.0_SP1.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/516958", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/518659", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/46838", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8475", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/71784", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.qnx.com/developers/articles/rel_5189_46.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.qnx.com/developers/docs/6.5.0_sp1/index.jsp?topic=%2Fcom.qnx.doc.momentics_release_notes%2Frel_6.5.0_SP1.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/516958", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/518659", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/46838", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-59"}]}], "descriptions": [{"lang": "en", "value": "The runtime linker in QNX Neutrino RTOS 6.5.0 before Service Pack 1 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack."}, {"lang": "es", "value": "El vinculador de tiempo de ejecuci\u00f3n en QNX Neutrino RTOS versi\u00f3n 6.5.0 anterior a Service Pack 1, no borra apropiadamente las variables de entorno LD_DEBUG_OUTPUT y LD_DEBUG cuando se genera un programa desde un programa setuid, lo que permite a los usuarios locales sobrescribir archivos por medio de un ataque de tipo symlink."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qnx:neutrino_rtos:6.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87489F9A-4D58-47A1-9759-144DAF02A3EF"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}