First published: Wed Apr 04 2001(Updated: )
Buffer overflow in QNX RTP 5.60 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large number of arguments to the stat command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTP | =5.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0325 is classified as a high severity vulnerability due to its potential to cause denial of service and execute arbitrary commands.
To mitigate CVE-2001-0325, it is recommended to upgrade to a newer version of QNX RTP that does not have this buffer overflow vulnerability.
CVE-2001-0325 specifically affects QNX RTP version 5.60.
CVE-2001-0325 is a buffer overflow vulnerability that can be exploited via the stat command.
Yes, CVE-2001-0325 can be exploited remotely by attackers sending a large number of arguments to the stat command.