First published: Tue Dec 31 2002(Updated: )
Multiple buffer overflows in QNX 4.25 may allow local users to execute arbitrary code via long command line arguments to (1) sample, (2) ex, (3) du, (4) find, (5) lex, (6) mkdir, (7) rm, (8) serserv, (9) tcpserv, (10) termdef, (11) time, (12) unzip, (13) use, (14) wcc, (15) wcc386, (16) wd, (17) wdisasm, (18) which, (19) wlib, (20) wlink, (21) wpp, (22) wpp386, (23) wprof, (24) write, or (25) wstrip.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qnx Qnx Rtos | =4.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1633 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To address CVE-2002-1633, upgrading to a newer version of QNX that does not have this vulnerability is recommended.
CVE-2002-1633 affects users of QNX RTOS version 4.25.
CVE-2002-1633 is a buffer overflow vulnerability that can be exploited via long command line arguments.
CVE-2002-1633 primarily allows for local exploitation as it requires access to the command line.