Vulnerability Description
QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnx | Rtos | 6.3.0 |
References
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015598
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=387Vendor Advisory
- http://www.osvdb.org/22958
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24552
- http://secunia.com/advisories/18750Vendor Advisory
- http://securitytracker.com/id?1015598
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=387Vendor Advisory
- http://www.osvdb.org/22958
- http://www.securityfocus.com/bid/16539
- http://www.vupen.com/english/advisories/2006/0474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24552
FAQ
What is CVE-2006-0623?
CVE-2006-0623 is a vulnerability with a CVSS score of 7.2 (HIGH). QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
How severe is CVE-2006-0623?
CVE-2006-0623 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0623?
Check the references section above for vendor advisories and patch information. Affected products include: Qnx Rtos.