Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
References
Configurations
Information
Published : 2006-02-08 18:02
Updated : 2017-07-19 18:29
NVD link : CVE-2006-0619
Mitre link : CVE-2006-0619
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
qnx
- rtos