{"vuid":"VU#961686","idnumber":"961686","name":"QNX PPPoEd vulnerable to buffer overflow","keywords":["QNX","PPPoEd","buffer overflow","arbitrary command execution"],"overview":"QNX PPPoEd contains a buffer overflow that may allow an attacker to execute arbitrary commands.","clean_desc":"QNX is an RTOS (Real-time Operating System). QNX is used in many different devices and industries, including, but not limited to routers\nmanufacturing and processing \nmedical equipment\nautomotive and transportation\nmilitary and aerospace\nconsumer electronics\nindustry automation and control The pppoed command is used to start the PPPoEd daemon which provides Point-to-Point Protocol over Ethernet (PPPoE) connections on QNX systems. The syntax of the PPPoEd command is pppoed [options] [suboptions] where [options] are user-supplied command-line parameters. A lack of bounds checking on the user-supplied options may allow a buffer overflow to occur. According to some reports, the following command-line options contain this vulnerability: name \nen\nupscript\ndownscript \nretries\ntimeout\nscriptdetach \nnoscript\nnodetach \nremote_mac\nlocal_mac However, other options may also contain this vulnerability,","impact":"An attacker may be able to execute arbitrary commands with elevated privileges or cause a denial-of-service condition.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Limit Access to PPPoEd Deny untrusted users the privileges needed to access the PPPoEd service.","sysaffected":"","thanks":"This vulnerability was publicly reported by Julio Cesar Fort.","author":"This document was written by Jeff Gennari.","public":["http://www.securitytracker.com/alerts/2004/Sep/1011154.html","http://www.osvdb.org/displayvuln.php?osvdb_id=9660","http://xforce.iss.net/xforce/xfdb/17280"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-08T16:55:07Z","publicdate":"2004-09-05T00:00:00Z","datefirstpublished":"2005-02-01T22:40:09Z","dateupdated":"2005-02-03T16:54:09Z","revision":152,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"18","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"11","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"12","cam_scorecurrent":"10.9395","cam_scorecurrentwidelyknown":"11.781","cam_scorecurrentwidelyknownexploited":"20.196","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.9395,"vulnote":null}