Vulnerability CVE-2011-4060


Published: 2011-10-17   Modified: 2012-02-13

Description:
The runtime linker in QNX Neutrino RTOS 6.5.0 before Service Pack 1 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Medium severity flaw in QNX Neutrino RTOS
Tim Brown
23.10.2011

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
4.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
QNX -> Neutrino rtos 

 References:
http://securityreason.com/securityalert/8475
http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc
http://www.qnx.com/developers/articles/rel_5189_46.html
http://www.qnx.com/developers/docs/6.5.0_sp1/index.jsp?topic=%2Fcom.qnx.doc.momentics_release_notes%2Frel_6.5.0_SP1.html
http://www.securityfocus.com/archive/1/516958
http://www.securityfocus.com/archive/1/518659
http://www.securityfocus.com/bid/46838

Copyright 2024, cxsecurity.com

 

Back to Top