Vulnerability Description
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnx | Rtos | 6.2.0 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0066.html
- http://marc.info/?l=bugtraq&m=103679043232178&w=2
- http://www.idefense.com/advisory/11.08.02b.txtExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10564.phpVendor Advisory
- http://www.securityfocus.com/bid/6146
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0066.html
- http://marc.info/?l=bugtraq&m=103679043232178&w=2
- http://www.idefense.com/advisory/11.08.02b.txtExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10564.phpVendor Advisory
- http://www.securityfocus.com/bid/6146
FAQ
What is CVE-2002-1239?
CVE-2002-1239 is a vulnerability with a CVSS score of 7.2 (HIGH). QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to...
How severe is CVE-2002-1239?
CVE-2002-1239 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1239?
Check the references section above for vendor advisories and patch information. Affected products include: Qnx Rtos.