Vulnerability Description
Buffer overflow in phrelay in BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868 that leverage improper handling of the /dev/photon device file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blackberry | Qnx Software Development Platform | - |
| Blackberry | Qnx Neutrino Rtos | <= 6.5.0 |
Related Weaknesses (CWE)
References
- http://aluigi.altervista.org/adv/qnxph_1-adv.txtExploit
- http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01PatchUS Government Resource
- http://www.qnx.com/download/feature.html?programid=24850Patch
- http://aluigi.altervista.org/adv/qnxph_1-adv.txtExploit
- http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01PatchUS Government Resource
- http://www.qnx.com/download/feature.html?programid=24850Patch
FAQ
What is CVE-2013-2688?
CVE-2013-2688 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Buffer overflow in phrelay in BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possib...
How severe is CVE-2013-2688?
CVE-2013-2688 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2688?
Check the references section above for vendor advisories and patch information. Affected products include: Blackberry Qnx Software Development Platform, Blackberry Qnx Neutrino Rtos.