CVE-2002-0793
moderate-risk
Published 2002-08-12
Hard link and possibly symbolic link following vulnerabilities in QNX RTOS 4.25 (aka QNX4) allow local users to overwrite arbitrary files via (1) the -f argument to the monitor utility, (2) the -d argument to dumper, (3) the -c argument to crttrap, or (4) using the Watcom sample utility.
Do I need to act?
-
0.20% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (18)
Broken Link
http://www.securityfocus.com/bid/4901
Broken Link
http://www.securityfocus.com/bid/4902
Broken Link
http://www.securityfocus.com/bid/4903
Broken Link
http://www.securityfocus.com/bid/4904
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9232
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9233
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9234
Broken Link
http://www.securityfocus.com/bid/4901
Broken Link
http://www.securityfocus.com/bid/4902
Broken Link
http://www.securityfocus.com/bid/4903
Broken Link
http://www.securityfocus.com/bid/4904
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9232
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9233
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/9234
31
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
8/34 · Low
Exposure
5/34 · Minimal