First published: Tue Nov 12 2002(Updated: )
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.