First published: Tue Oct 18 2011(Updated: )
The runtime linker in QNX Neutrino RTOS 6.5.0 before Service Pack 1 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNX Neutrino RTOS | =6.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4060 is classified as high due to the potential for local users to overwrite files through a symlink attack.
To fix CVE-2011-4060, update to QNX Neutrino RTOS version 6.5.0 Service Pack 1 or later.
CVE-2011-4060 exploits improper handling of the LD_DEBUG_OUTPUT and LD_DEBUG environment variables in setuid programs.
Local users on systems running QNX Neutrino RTOS 6.5.0 prior to Service Pack 1 are affected by CVE-2011-4060.
CVE-2011-4060 is associated with a symlink attack that allows file overwriting.