RDFS Labs identifies a possible race condition with the way crttrap spawns io-graphics. This was reported to QSS with apparently no response, therefor the information was released on the web.*** rfdslabs security advisory ***
Title: QNX crrtrap possible race condition vulnerability [RLSA_04-2004]
Versions: QNX RTP 6.1 (possibly others)
Date: Sep 13 2004
Author: Julio Cesar Fort
crrtrap is a tool to detect video hardware and starts the correct driver for QNX.
crttrap does a sequence of commands before calls 'io-graphics', an external program part of Photon. Because of this, there is a theorical race condition vulnerability.
(1) /bin/cd /usr/photon/bin
(2) io-graphics [arguments]
This spot (*) is where the race condition lies. If we are able to modify $PATH in the exact moment before crrtrap calls step 2, we could obtain local root priviledges because it will execute 'io-graphics' (our code) looking for it in /tmp directory.
If an attacker writes a code to neverend loop changing everytime $PATH and runs it into background, there is a theorical possiblility to modify environment and trick crttrap.
QNX Software Systems was contacted in september 8th but vendor didn't reply. It seems they don't care much about security (they don't even have a security staff e-mail, but SALES e-mail adddress is everywhere at qnx.com!).
26 Aug 2004: Vulnerability detected;
08 Sep 2004: rfdslabs contacts QNX: no success;
Thanks to DataStorm Technologies and some stranger in mobius.qnx.com who was intersted in rfdslabs.com.br.