Vulnerabilities > CVE-2004-1681 - Utility Server Flag Buffer Overflow vulnerability in QNX Photon Microgui and RTP

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
qnx
exploit available

Summary

Multiple buffer overflows in (1) phrelay-cfg, (2) phlocale, (3) pkg-installer, or (4) input-cfg in QNX Photon microGUI for QNX RTP 6.1 allow local users to gain privileges via a long -s (server) command line parameter.

Vulnerable Configurations

Part Description Count
Application
Qnx
2

Exploit-Db

  • descriptionQNX Photon phlocale -s Parameter Overflow. CVE-2004-1681. Dos exploit for unix platform
    idEDB-ID:24594
    last seen2016-02-02
    modified2004-09-13
    published2004-09-13
    reporterJulio Cesar Fort
    sourcehttps://www.exploit-db.com/download/24594/
    titleQNX Photon phlocale - -s Parameter Overflow
  • descriptionQNX Photon pkg-installer -s Parameter Overflow. CVE-2004-1681. Dos exploit for unix platform
    idEDB-ID:24596
    last seen2016-02-02
    modified2004-09-13
    published2004-09-13
    reporterJulio Cesar Fort
    sourcehttps://www.exploit-db.com/download/24596/
    titleQNX Photon pkg-installer - -s Parameter Overflow
  • descriptionQNX Photon input-cfg -s Parameter Overflow. CVE-2004-1681. Dos exploit for unix platform
    idEDB-ID:24595
    last seen2016-02-02
    modified2004-09-13
    published2004-09-13
    reporterJulio Cesar Fort
    sourcehttps://www.exploit-db.com/download/24595/
    titleQNX Photon input-cfg - -s Parameter Overflow
  • descriptionQNX Photon phrelay-cfg -s Parameter Overflow. CVE-2004-1681. Dos exploit for unix platform
    idEDB-ID:24593
    last seen2016-02-02
    modified2004-09-13
    published2004-09-13
    reporterJulio Cesar Fort
    sourcehttps://www.exploit-db.com/download/24593/
    titleQNX Photon phrelay-cfg - -s Parameter Overflow