Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Medium severity flaw in QNX Neutrino RTOS
From: Tim Brown <timb () nth-dimension org uk>
Date: Fri, 11 Mar 2011 12:12:33 +0000

I was recently taking a look at the state of play regarding the security of 
POSIX runtime linkers and was pointed at the QNX Neutrino RTOS to take a look.  
In doing so I noticed a problem relating to the way that it handles 
LD_DEBUG_OUTPUT which allows for the creation or overwriting of an arbitrary 
file.  Moreover the technique by which this can be achieved can be triggered 
even where the binary being executed is setUID and is running as another user.

Tim Brown
<mailto:timb () nth-dimension org uk>

Attachment: NDSA20110310.txt.asc

Attachment: signature.asc
Description: This is a digitally signed message part.

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Medium severity flaw in QNX Neutrino RTOS Tim Brown (Mar 11)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]