QNX PPPoEd路径环境变量本地命令执行漏洞

漏洞信息详情

QNX PPPoEd路径环境变量本地命令执行漏洞

漏洞简介

QNX RTP 6.1版本的PPPoE daemon (PPPoEd)存在执行不受信任路径漏洞。本地用户可以通过修改指向恶意安装程序的PATH环境变量执行任意程序。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源:US-CERT Vulnerability Note: VU#577566
名称: VU#577566
链接:http://www.kb.cert.org/vuls/id/577566

来源: XF
名称: qnx-rtp-mount-command-execute(17284)
链接:http://xforce.iss.net/xforce/xfdb/17284

来源: BID
名称: 11105
链接:http://www.securityfocus.com/bid/11105

来源: OSVDB
名称: 9661
链接:http://www.osvdb.org/9661

来源: FULLDISC
名称: 20040903 [RLSA_01-2004] QNX PPPoEd local root vulnerabilities
链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享