Vulnerability Description
Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnx | Neutrino Rtos | 6.3.0 |
References
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015599
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=380Vendor Advisory
- http://www.osvdb.org/22966
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24559
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015599
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=380Vendor Advisory
- http://www.osvdb.org/22966
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24559
FAQ
What is CVE-2006-0618?
CVE-2006-0618 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
How severe is CVE-2006-0618?
CVE-2006-0618 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0618?
Check the references section above for vendor advisories and patch information. Affected products include: Qnx Neutrino Rtos.