First published: Thu Feb 09 2006(Updated: )
Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX Neutrino RTOS | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0618 has been classified as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.
To fix CVE-2006-0618, it is recommended to update QNX Neutrino RTOS to a later version that addresses this vulnerability.
CVE-2006-0618 affects users of QNX Neutrino RTOS version 6.3.0.
CVE-2006-0618 enables local users to launch format string attacks leading to arbitrary code execution.
Yes, CVE-2006-0618 remains relevant for systems running the affected version of QNX Neutrino RTOS, particularly in environments where legacy systems are in use.