QNX RTOS is a real-time operating system designed for use on embedded systems. It is distributed and maintained by QNX. It has been discovered that the following programs are vulnerable to buffer overflows: /bin/du /bin/ex /bin/find /bin/lex /bin/mkdir /bin/rm /bin/sample /bin/serserv /bin/tcpserv /bin/termdef /bin/time /bin/unzip /bin/use /bin/wcc /bin/wcc386 /bin/wd /bin/wdisasm /bin/which /bin/wlib /bin/wlink /bin/wpp /bin/wpp386 /bin/wprof /bin/write /bin/wstrip Some but not all of these executables are setuid. Any vulnerable setuid executables may allow a local user to execute arbitrary code, and gain elevated privileges.
QNX RTOS is a real-time operating system designed for use on embedded systems. It is distributed and maintained by QNX. It has been discovered that the following programs are vulnerable to buffer overflows: /bin/du /bin/ex /bin/find /bin/lex /bin/mkdir /bin/rm /bin/sample /bin/serserv /bin/tcpserv /bin/termdef /bin/time /bin/unzip /bin/use /bin/wcc /bin/wcc386 /bin/wd /bin/wdisasm /bin/which /bin/wlib /bin/wlink /bin/wpp /bin/wpp386 /bin/wprof /bin/write /bin/wstrip Some but not all of these executables are setuid. Any vulnerable setuid executables may allow a local user to execute arbitrary code, and gain elevated privileges.