Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html | Exploit |
http://www.rfdslabs.com.br/qnx-advs-01-2004.txt | |
http://www.kb.cert.org/vuls/id/577566 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/11105 | Exploit |
http://www.osvdb.org/9661 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17284 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-12-30 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-1391
Mitre link : CVE-2004-1391
JSON object : View
CWE
Products Affected
qnx
- rtos
- rtp