vendor:
QNX RTOS
by:
SecurityFocus
8.3
CVSS
HIGH
Symbolic Link Following by dumper
N/A
CWE
Product Name: QNX RTOS
Affected Version From: QNX RTOS
Affected Version To: QNX RTOS
Patch Exists: No
Related CWE: N/A
CPE: o:qnx:qnx_rtos
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
Symbolic Link Following by dumper
The QNX RTOS debugging utility 'dumper' follows symbolic links and sets ownership of the file to the userid of the terminated process. This can be exploited by malicious local attackers to overwrite and gain ownership of arbitrary files, allowing them to elevate to root privileges by modifying files such as '/etc/passwd'.
Mitigation:
Ensure that the dumper utility is not used in a way that allows malicious users to exploit this vulnerability.