CVE-2014-2534
Published Mar 18, 2014
Last updated 11 years ago
Overview
- Description
- /sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4476D9C6-C77C-4420-A629-38A8FA195640" }, { "criteria": "cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19D877E0-F8F1-434F-97F3-1DD32883FA77" }, { "criteria": "cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39364705-D046-4BA2-9BFF-ACF2F75EC209" } ], "operator": "OR" } ] } ]