CVE-2014-2534
Summary
| CVE | CVE-2014-2534 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-03-18 05:18:19 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | /sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
NoneAvailability
NoneAV:L/AC:L/Au:N/C:C/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Blackberry | Qnx Neutrino Rtos | 6.4.1 | All | All | All |
| Operating System | Blackberry | Qnx Neutrino Rtos | 6.5.0 | All | All | All |
| Operating System | Blackberry | Qnx Neutrino Rtos | 6.5.0 | sp1 | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full Disclosure: Re: Medium severity flaw in BlackBerry QNX Neutrino RTOS | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| Bugtraq: Re: Medium severity flaw in BlackBerry QNX Neutrino RTOS | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| Full Disclosure: Medium severity flaw in BlackBerry QNX Neutrino RTOS | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| QNX 6.4.x/6.5.x pppoectl - Information Disclosure | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Exploit |
| Bugtraq: Medium severity flaw in BlackBerry QNX Neutrino RTOS | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.