First published: Fri Jul 12 2013(Updated: )
Stack-based buffer overflow in the bpe_decompress function in (1) BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 and (2) QNX Momentics Tool Suite through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlackBerry QNX Momentics | <=6.5.0 | |
BlackBerry QNX Momentics | =4.5 | |
BlackBerry QNX Momentics | =4.6 | |
BlackBerry QNX Momentics | =4.7 | |
BlackBerry QNX Momentics | =6.5.0 | |
BlackBerry QNX | ||
QNX Neutrino RTOS | <=6.5.0 | |
QNX Neutrino RTOS | =6.4.1 | |
QNX Neutrino RTOS | =6.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-2687 is classified as medium due to potential remote code execution and denial of service risks.
To fix CVE-2013-2687, update the affected BlackBerry QNX Neutrino RTOS or QNX Momentics Tool Suite to the latest version available.
CVE-2013-2687 affects the BlackBerry QNX Neutrino RTOS versions through 6.5.0 SP1 and the QNX Momentics Tool Suite versions through 6.5.0 SP1.
The potential impacts of CVE-2013-2687 include application crashes and the possibility for remote code execution.
Users and organizations utilizing the vulnerable versions of BlackBerry QNX Neutrino RTOS and QNX Momentics Tool Suite are impacted by CVE-2013-2687.