First published: Thu Feb 09 2006(Updated: )
Multiple buffer overflows in QNX Neutrino RTOS 6.2.0 allow local users to execute arbitrary code via a long first argument to the (1) su or (2) passwd commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0621 is classified as a high severity vulnerability due to the potential for local code execution.
To fix CVE-2006-0621, update QNX Neutrino RTOS to the latest version provided by the vendor.
CVE-2006-0621 affects local users of QNX Neutrino RTOS version 6.2.0.
CVE-2006-0621 is a buffer overflow vulnerability.
CVE-2006-0621 cannot be exploited remotely as it requires local access to the system.