First published: Fri Jul 12 2013(Updated: )
Buffer overflow in phrelay in BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868 that leverage improper handling of the /dev/photon device file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlackBerry QNX | ||
QNX Neutrino RTOS | <=6.5.0 | |
QNX Neutrino RTOS | =6.4.1 | |
QNX Neutrino RTOS | =6.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2688 is classified as a high severity vulnerability due to its potential to cause application crashes and execute arbitrary code.
To fix CVE-2013-2688, update the BlackBerry QNX Software Development Platform or the Neutrino RTOS to the latest version that addresses this buffer overflow issue.
CVE-2013-2688 enables remote attackers to perform denial of service attacks or possibly execute arbitrary code by sending crafted packets.
CVE-2013-2688 affects BlackBerry QNX Neutrino RTOS versions up to 6.5.0 SP1 and the BlackBerry QNX Software Development Platform.
As a workaround for CVE-2013-2688, consider blocking TCP port 4868 to prevent the delivery of crafted packets until a patch is applied.