Multiple vulnerabilities have been reported in QNX Neutrino RTOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.
1) The crttrap utility loads libraries insecurely, which can be exploited to load an arbitrary library containing malicious code by manipulating the LD_LIBRARY_PATH environment variable.
Successful exploitation allows execution of arbitrary code with root privileges (installed setuid "root" by default), but requires that the system is in text mode.
The vulnerability has been reported in version 6.2.1. Other versions may also be affected.
2) A format string error in the fontsleuth utility can be exploited to execute arbitrary code with root privileges (installed setuid "root" by default) by supplying a specially crafted string as the zeroth argument.
The vulnerability has been reported in version 6.3.0. Other versions may also be affected.
3) A boundary error in the libAp system library in the "_ApFindTranslationFile()" function when handling the ABLPATH environment variable can be exploited to cause a stack-based buffer overflow and execute arbitrary code with root privileges (used by various utilities installed setuid "root" by default).
A similar vulnerability is also present in the handling of the ABLANG environment variable.
The vulnerabilities have been reported in version 6.3.0. Other versions may also be affected.
4) A boundary error in the libph system library in the "setitem()" function when handling the PHOTON_PATH environment variable can be exploited to cause a stack-based buffer overflow and execute arbitrary code with root privileges (used by various utilities installed setuid "root" by default).
The vulnerabilities have been reported in version 6.3.0. Other versions may also be affected.
5) A race condition in the phfont utility (installed setuid "root" by default) when spawning phfontphf can be exploited to gain root privileges by manipulating the PHFONT and PHOTON2_PATH environment variables.
The vulnerability has been reported in version 6.2.1. Other versions may also be affected.
6) A boundary error in the su utility can be exploited to cause a stack-based buffer overflow by passing an overly long string as the first command line argument.
Successful exploitation allows execution of arbitrary code with "root" privileges (installed setuid "root" by default).
The vulnerability has been reported in version 6.2.0. Other versions may also be affected.
7) An error can be exploited to cause the system to become unresponsive and hang by executing the following command:
echo -e "break *0xb032d59fnrncontncont" | gdb gdb
The vulnerability has been reported in version 6.3.0. The vulnerability does not affect version 6.0. Other versions may also be affected.
8) Insecure file permissions on the "/etc/rc.d/rc.local" file can be exploited to gain "root" privileges by adding arbitrary commands to the file.
The security issue has been reported in version 6.3.0. Version 6.0 is unaffected. Other versions may also be vulnerable.
9) A boundary error in the passwd utility can be exploited to cause a buffer overflow by passing an overly long string as the first command line argument.
Successful exploitation allows execution of arbitrary code with "root" privileges (installed setuid "root" by default).
The vulnerability has been reported in version 6.2.0. Other versions may also be affected.
Solution:
Grant only trusted users access to affected systems.
Remove setuid bits from affected files. Set proper file permissions on the rc.local file, and allow only trusted users to run GDB.
Provided and/or discovered by:
1) Discovered by anonymous person and reported via iDEFENSE.
2) iDefense Labs
3) Filipe Balestra
4) Filipe Balestra
5) Knud Højgaard
6) Texonet
7) Discovered by anonymous person and reported via iDEFENSE.
8) Discovered by anonymous person and reported via iDEFENSE.
9) Texonet