Vulnerability Description
Race condition in phfont in QNX Neutrino RTOS 6.2.1 allows local users to execute arbitrary code via unspecified manipulations of the PHFONT and PHOTON2_PATH environment variables.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnx | Rtos | 6.2.1 |
References
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015599
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=383
- http://www.osvdb.org/22963
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24555
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015599
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=383
- http://www.osvdb.org/22963
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24555
FAQ
What is CVE-2006-0620?
CVE-2006-0620 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Race condition in phfont in QNX Neutrino RTOS 6.2.1 allows local users to execute arbitrary code via unspecified manipulations of the PHFONT and PHOTON2_PATH environment variables.
How severe is CVE-2006-0620?
CVE-2006-0620 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0620?
Check the references section above for vendor advisories and patch information. Affected products include: Qnx Rtos.