QNX RTOS su Password Hash Disclosure...

- AV AC AU C I A
发布: 2002-06-03
修订: 2025-04-13

It has been reported that the 'su' utility for QNX RTOS accepts the SIGSEGV signal and dumps a world readable core file. An attacker is able to analyze the core file and obtain very sensitive information. It is very probable that this is a kernel-based vulnerability affecting not only 'su', but other setuid programs as well

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息