Vulnerability Note VU#961686
QNX PPPoEd vulnerable to buffer overflow
QNX PPPoEd contains a buffer overflow that may allow an attacker to execute arbitrary commands.
QNX is an RTOS (Real-time Operating System). QNX is used in many different devices and industries, including, but not limited to
The pppoed command is used to start the PPPoEd daemon which provides Point-to-Point Protocol over Ethernet (PPPoE) connections on QNX systems. The syntax of the PPPoEd command is
where [options] are user-supplied command-line parameters. A lack of bounds checking on the user-supplied options may allow a buffer overflow to occur. According to some reports, the following command-line options contain this vulnerability:
However, other options may also contain this vulnerability,
An attacker may be able to execute arbitrary commands with elevated privileges or cause a denial-of-service condition.
We are currently unaware of a practical solution to this problem.
Limit Access to PPPoEd
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|QNX||Affected||-||10 Sep 2004|
CVSS Metrics (Learn More)
This vulnerability was publicly reported by Julio Cesar Fort.
This document was written by Jeff Gennari.
- CVE IDs: Unknown
- Date Public: 05 Sep 2004
- Date First Published: 01 Feb 2005
- Date Last Updated: 03 Feb 2005
- Severity Metric: 10.94
- Document Revision: 152
If you have feedback, comments, or additional information about this vulnerability, please send us email.