First published: Thu Feb 09 2006(Updated: )
Race condition in phfont in QNX Neutrino RTOS 6.2.1 allows local users to execute arbitrary code via unspecified manipulations of the PHFONT and PHOTON2_PATH environment variables.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.2.1b | |
QNX RTOS | =6.2.1a | |
QNX RTOS | =6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0620 is classified as a high-severity vulnerability due to its potential to allow arbitrary code execution.
Users of QNX Neutrino RTOS 6.2.1 and its variations are at risk of local users executing arbitrary code due to a race condition.
To mitigate CVE-2006-0620, ensure that environment variables PHFONT and PHOTON2_PATH are securely managed and avoid manipulations by untrusted users.
Yes, CVE-2006-0620 remains a risk for current deployments of QNX RTOS 6.2.1 and its earlier versions.
Patches may not be available for CVE-2006-0620 as it is an older vulnerability, so consult the QNX support channels for guidance.