First published: Tue Nov 12 2002(Updated: )
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1239 is considered a high severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2002-1239, users should ensure the PATH environment variable does not include directories writable by untrusted users or set appropriate permissions on the cp executable.
CVE-2002-1239 affects users of QNX Neutrino RTOS version 6.2.0.
CVE-2002-1239 is a local privilege escalation vulnerability.
CVE-2002-1239 cannot be exploited remotely, as it requires local access to the system.