First published: Thu Feb 09 2006(Updated: )
Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0619 has a high severity rating due to the potential for local users to execute arbitrary code.
To mitigate CVE-2006-0619, upgrade the QNX Neutrino RTOS to a version later than 6.3.0 that addresses the buffer overflow vulnerabilities.
CVE-2006-0619 specifically affects QNX Neutrino RTOS version 6.3.0.
CVE-2006-0619 requires local access to exploit the buffer overflows, so it is not a remote vulnerability.
Exploitation of CVE-2006-0619 can lead to arbitrary code execution, which could compromise the integrity and confidentiality of the affected system.