vendor:
QNX 6.5.0
by:
cenobyte
7,2
CVSS
HIGH
Buffer Overflow
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: QNX 6.5.0
Affected Version From: QNX 6.5.0SP1
Affected Version To: QNX 6.4.1
Patch Exists: NO
Related CWE: N/A
CPE: o:qnx:qnx_6.5.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: x86
2013
QNX 6.5.0 x86 io-graphics local root exploit by cenobyte 2013
Setuid root /usr/photon/bin/io-graphics on QNX is prone to a buffer overflow. The vulnerability is due to insufficent bounds checking of the PHOTON2_HOME environment variable. This is a return-to-libc exploit that yields euid=0. The addresses of system() and exit() are retrieved from libc using dlsym(). The address of /bin/sh is retrieved by searching from address 0xb0300000.
Mitigation:
Ensure that the PHOTON2_HOME environment variable is properly bounded and that the application is running with the least privileges necessary.