CVE-2005-0465 – SGI IRIX 6.5.22 - GR_OSView Local Arbitrary File Overwrite
https://notcve.org/view.php?id=CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option. • https://www.exploit-db.com/exploits/25362 ftp://patches.sgi.com/support/free/security/advisories/20050402-01-P http://secunia.com/advisories/14875 http://securitytracker.com/id?1013662 http://www.idefense.com/application/poi/display?id=225&type=vulnerabilities •
CVE-2004-0139
https://notcve.org/view.php?id=CVE-2004-0139
Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors. Vulnerabilidad desconocida en la parte de red del kernel bsd.a de SGI IRIX 6.5.22 a 6.5.25,, y posiblemente versiones anteriores, en los que "t_unbind cambia el comportamiento de t_bind", con impacto y vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20040905-01-P.asc http://secunia.com/advisories/12682 http://www.securityfocus.com/bid/11276 https://exchange.xforce.ibmcloud.com/vulnerabilities/17547 •
CVE-2004-0136
https://notcve.org/view.php?id=CVE-2004-0136
The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary." La llamada a la función mapelf32exec en IRIX 6.5.20 6.5.24 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante un "binario corrupto". • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7123 http://www.securityfocus.com/bid/10547 https://exchange.xforce.ibmcloud.com/vulnerabilities/16416 •
CVE-2004-0135
https://notcve.org/view.php?id=CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory. La llamada de sistema syssgi SGI_IOPROVE en IRIX 6.5.20 a 6.5.24 permite a usuarios locales ganar privilegios leyendo y escribiendo en la memoria del kernel. • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7122 https://exchange.xforce.ibmcloud.com/vulnerabilities/16413 •
CVE-2004-0137
https://notcve.org/view.php?id=CVE-2004-0137
Unknown vulnerability in init for IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues." Vulnerabilidad desconocida en init de IRIX 6.5.20 A 6.5.24 permite a usuarios locales causar una denegación de servicio (pánico de sistema) como resultado de "problemas con invalidación de página". • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7124 http://www.securityfocus.com/bid/10549 https://exchange.xforce.ibmcloud.com/vulnerabilities/16417 •