Overview
QNX PPPoEd contains a buffer overflow that may allow an attacker to execute arbitrary commands.
Description
QNX is an RTOS (Real-time Operating System). QNX is used in many different devices and industries, including, but not limited to
The pppoed command is used to start the PPPoEd daemon which provides Point-to-Point Protocol over Ethernet (PPPoE) connections on QNX systems. The syntax of the PPPoEd command is pppoed [options] [suboptions] where [options] are user-supplied command-line parameters. A lack of bounds checking on the user-supplied options may allow a buffer overflow to occur. According to some reports, the following command-line options contain this vulnerability:
However, other options may also contain this vulnerability, |
Impact
An attacker may be able to execute arbitrary commands with elevated privileges or cause a denial-of-service condition. |
Solution
We are currently unaware of a practical solution to this problem. |
Limit Access to PPPoEd
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly reported by Julio Cesar Fort.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 10.94 |
Date Public: | 2004-09-05 |
Date First Published: | 2005-02-01 |
Date Last Updated: | 2005-02-03 16:54 UTC |
Document Revision: | 152 |