CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

SGI : Security Vulnerabilities (CVSS score between 4 and 4.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2004-2001 2004-05-05 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
ifconfig "-arp" in SGI IRIX 6.5 through 6.5.22m does not properly disable ARP requests from being sent or received.
2 CVE-2004-1184 Exec Code 2005-01-21 2010-08-21
4.6
User Local Low Not required Partial Partial Partial
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
3 CVE-2004-0108 2004-04-15 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.
4 CVE-2004-0107 2004-04-15 2010-08-21
4.6
User Local Low Not required Partial Partial Partial
The (1) post and (2) trigger scripts in sysstat 4.0.7 and earlier allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108.
5 CVE-2003-0859 DoS 2003-12-15 2010-08-21
4.9
None Local Low Not required None None Complete
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
6 CVE-2003-0177 2003-08-18 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, does not follow "-" entries in the /etc/group file, which may cause subsequent group membership entries to be processed inadvertently.
7 CVE-2002-2185 DoS 2002-12-31 2010-08-21
4.9
None Local Low Not required None None Complete
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
8 CVE-2002-1787 Exec Code Overflow 2002-12-31 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Buffer overflow in uux in eoe.sw.uucp package of SGI IRIX 6.5 through 6.5.17 allows local users to execute arbitrary code via unknown attack vectors.
9 CVE-2002-1517 2003-04-02 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
fsr_efs in IRIX 6.5 allows local users to conduct unauthorized file activities via a symlink attack, possibly via the .fsrlast file.
10 CVE-2002-1516 2003-04-02 2008-09-10
4.6
User Local Low Not required Partial Partial Partial
rpcbind in SGI IRIX, when using the -w command line switch, allows local users to overwrite arbitrary files via a symlink attack.
11 CVE-2002-1323 2002-12-11 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
12 CVE-2002-0358 +Priv 2002-07-26 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
MediaMail and MediaMail Pro in SGI IRIX 6.5.16 and earlier allows local users to force the program to dump core via certain arguments, which could allow the users to read sensitive data or gain privileges.
13 CVE-2000-0545 Overflow +Priv 2000-08-08 2008-09-10
4.6
User Local Low Not required Partial Partial Partial
Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter.
14 CVE-1999-1501 Exec Code 1998-04-08 2008-09-10
4.6
None Local Low Not required Partial Partial Partial
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands.
15 CVE-1999-1401 1996-12-05 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
16 CVE-1999-1243 +Priv 1995-03-03 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges.
17 CVE-1999-1120 +Priv 1997-01-04 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
18 CVE-1999-0234 1996-10-08 2008-09-09
4.6
User Local Low Not required Partial Partial Partial
Bash treats any character with a value of 255 as a command separator.
19 CVE-1999-0125 Overflow 1998-01-25 2008-09-09
4.6
User Local Low Not required Partial Partial Partial
Buffer overflow in SGI IRIX mailx program.
20 CVE-1999-0026 Overflow 1997-07-16 2008-09-09
4.6
User Local Low Not required Partial Partial Partial
root privileges via buffer overflow in pset command on SGI IRIX systems.
Total number of vulnerabilities : 20   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.