Описание
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-1391
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17284
- http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html
- http://www.kb.cert.org/vuls/id/577566
- http://www.osvdb.org/9661
- http://www.rfdslabs.com.br/qnx-advs-01-2004.txt
- http://www.securityfocus.com/bid/11105
EPSS
Процентиль: 41%
0.00191
Низкий
CVE ID
Связанные уязвимости
nvd
больше 20 лет назад
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
EPSS
Процентиль: 41%
0.00191
Низкий