7.2
CVSSv2

CVE-2004-1681

Published: 26/08/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 740
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in (1) phrelay-cfg, (2) phlocale, (3) pkg-installer, or (4) input-cfg in QNX Photon microGUI for QNX RTP 6.1 allow local users to gain privileges via a long -s (server) command line parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

qnx photon microgui

qnx rtp 6.1

Exploits

source: wwwsecurityfocuscom/bid/11164/info Reportedly QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers An attacker may leverage these ...
source: wwwsecurityfocuscom/bid/11164/info Reportedly QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers An attacker may leverage these ...
source: wwwsecurityfocuscom/bid/11164/info Reportedly QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers An attacker may leverage these is ...
source: wwwsecurityfocuscom/bid/11164/info Reportedly QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers An attacker may leverage thes ...