Vulnerability Details : CVE-2014-2534
/sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow.
Exploit prediction scoring system (EPSS) score for CVE-2014-2534
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 18 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-2534
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:C/I:N/A:N |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2014-2534
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2534
-
http://seclists.org/bugtraq/2014/Mar/66
Bugtraq: Medium severity flaw in BlackBerry QNX Neutrino RTOS
-
http://seclists.org/fulldisclosure/2014/Mar/124
Full Disclosure: Re: Medium severity flaw in BlackBerry QNX Neutrino RTOS
-
http://seclists.org/bugtraq/2014/Mar/88
Bugtraq: Re: Medium severity flaw in BlackBerry QNX Neutrino RTOS
-
http://seclists.org/fulldisclosure/2014/Mar/98
Full Disclosure: Medium severity flaw in BlackBerry QNX Neutrino RTOS
-
http://www.exploit-db.com/exploits/32156/
QNX 6.4.x/6.5.x pppoectl - Information Disclosure - QNX local ExploitExploit
Products affected by CVE-2014-2534
- cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:sp1:*:*:*:*:*:*