First published: Thu Feb 09 2006(Updated: )
QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX RTOS | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0623 is considered a high severity vulnerability due to its potential for local users to execute arbitrary code.
To fix CVE-2006-0623, change the permissions of /etc/rc.d/rc.local to remove world-writable access.
CVE-2006-0623 affects systems running QNX Neutrino RTOS version 6.3.0.
Attackers can modify /etc/rc.d/rc.local to execute arbitrary commands at system startup.
CVE-2006-0623 is a local vulnerability, meaning it can only be exploited by users with local access to the system.