CVE-2014-2534
/sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0065 (0.7%)
Percentile: 71.0%
EPSS: 2026-05-06
Affects
blackberry:qnx_neutrino_rtosTechnical description
/sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow.
Published: 3/18/2014, 5:18:19 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://seclists.org/bugtraq/2014/Mar/66
- http://seclists.org/bugtraq/2014/Mar/88
- http://seclists.org/fulldisclosure/2014/Mar/124
- http://seclists.org/fulldisclosure/2014/Mar/98
- http://www.exploit-db.com/exploits/32156/
- http://seclists.org/bugtraq/2014/Mar/66
- http://seclists.org/bugtraq/2014/Mar/88
- http://seclists.org/fulldisclosure/2014/Mar/124