Описание
Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags.
Ссылки
- Third Party AdvisoryUS Government Resource
- Exploit
- Third Party AdvisoryUS Government Resource
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:qnx:rtos:2.4:*:*:*:*:*:*:*
cpe:2.3:a:qnx:rtos:4.25:*:*:*:*:*:*:*
cpe:2.3:a:qnx:rtos:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qnx:rtos:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qnx:rtos:6.2.0a:*:*:*:*:*:*:*
cpe:2.3:a:qnx:rtp:6.1:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.09598
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags.
EPSS
Процентиль: 93%
0.09598
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other