Vulnerability Description
Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnx | Rtos | 2.4 |
| Qnx | Rtp | 6.1 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html
- http://www.kb.cert.org/vuls/id/961686Third Party AdvisoryUS Government Resource
- http://www.rfdslabs.com.br/qnx-advs-01-2004.txt
- http://www.securityfocus.com/bid/11104Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17280
- http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html
- http://www.kb.cert.org/vuls/id/961686Third Party AdvisoryUS Government Resource
- http://www.rfdslabs.com.br/qnx-advs-01-2004.txt
- http://www.securityfocus.com/bid/11104Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17280
FAQ
What is CVE-2004-1390?
CVE-2004-1390 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript...
How severe is CVE-2004-1390?
CVE-2004-1390 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1390?
Check the references section above for vendor advisories and patch information. Affected products include: Qnx Rtos, Qnx Rtp.