First published: Fri Dec 31 2004(Updated: )
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.2.0 | |
QNX RTP | =6.1 | |
QNX RTOS | =6.2.1b | |
QNX RTOS | =6.3.0 | |
QNX RTOS | =6.1.0a | |
QNX RTOS | =6.2.1a | |
QNX RTOS | =6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1391 is considered a high severity vulnerability due to its potential to allow local users to execute arbitrary programs.
To fix CVE-2004-1391, users should ensure that the PATH environment variable is not modifiable by untrusted users and update to the latest version of QNX that addresses this vulnerability.
CVE-2004-1391 affects local users of QNX RTP 6.1 and its subsequent versions.
CVE-2004-1391 is classified as an untrusted execution path vulnerability.
An attacker exploiting CVE-2004-1391 can execute arbitrary programs on the system by manipulating the PATH environment variable.