CVE-2002-0793

Hard link and possibly symbolic link following vulnerabilities in QNX RTOS 4.25 (aka QNX4) allow local users to overwrite arbitrary files via (1) the -f argument to the monitor utility, (2) the -d argument to dumper, (3) the -c argument to crttrap, or (4) using the Watcom sample utility.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2002-05/0292.html Broken Link Exploit Vendor Advisory
http://www.iss.net/security_center/static/9231.php Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/4901 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/4902 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/4903 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/4904 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/9232 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/9233 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/9234 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:blackberry:qnx_neutrino_real-time_operating_system:4.25:*:*:*:*:*:*:*

History

No history.

Information

Published : 2002-08-12 04:00

Updated : 2024-01-26 17:18


NVD link : CVE-2002-0793

Mitre link : CVE-2002-0793

CVE.ORG link : CVE-2002-0793


JSON object : View

Products Affected

blackberry

  • qnx_neutrino_real-time_operating_system
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')