header-logo
Suggest Exploit
vendor:
QNX
by:
SecurityFocus
7.2
CVSS
HIGH
Buffer-overflow, Format-string, Insecure library-path, Insecure default-directory-permission, Denial-of-Service
N/A
CWE
Product Name: QNX
Affected Version From: 6.2.2000
Affected Version To: 6.3
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

QNX Multiple Local Vulnerabilities

QNX is susceptible to multiple local vulnerabilities. These issues include multiple buffer-overflow vulnerabilities, a format-string vulnerability, an insecure library-path vulnerability, insecure default-directory-permission vulnerability, and a denial-of-service vulnerability. These issues allow local attackers to execute arbitrary machine code and commands with superuser privileges, facilitating the complete compromise of affected computers. Attackers may also crash affected computers, denying service to legitimate users. To exploit the denial-of-service vulnerability, the following command is reportedly sufficient: echo -e "break *0xb032d59fnrncontncont" | gdb gdb

Mitigation:

Upgrade to the latest version of QNX
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/16539/info

QNX is susceptible to multiple local vulnerabilities. These issues include multiple buffer-overflow vulnerabilities, a format-string vulnerability, an insecure library-path vulnerability, insecure default-directory-permission vulnerability, and a denial-of-service vulnerability.

These issues allow local attackers to execute arbitrary machine code and commands with superuser privileges, facilitating the complete compromise of affected computers. Attackers may also crash affected computers, denying service to legitimate users.

QNX version 6.2.0, 6.2.1, and 6.3 are affected by these issues; earlier versions may also be affected. 

To exploit the denial-of-service vulnerability, the following command is reportedly sufficient:

echo -e "break *0xb032d59fnrncontncont" | gdb gdb