CVE-1999-1243 – IRIX 5.2/6.0 - Permissions File Manipulation
https://notcve.org/view.php?id=CVE-1999-1243
SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373 http://ciac.llnl.gov/ciac/bulletins/f-16.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2113 •
CVE-1999-1022 – SGI IRIX 5.2/5.3 - 'serial_ports' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1022
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. • https://www.exploit-db.com/exploits/19351 http://www.securityfocus.com/archive/1/930 http://www.securityfocus.com/bid/464 https://exchange.xforce.ibmcloud.com/vulnerabilities/2111 •
CVE-1999-1219 – SGI IRIX 5.1/5.2 - 'sgihelp' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1219
Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command. • https://www.exploit-db.com/exploits/19354 http://ciac.llnl.gov/ciac/bulletins/e-33.shtml http://www.cert.org/advisories/CA-1994-13.html http://www.securityfocus.com/bid/468 https://exchange.xforce.ibmcloud.com/vulnerabilities/511 •
CVE-1999-1494 – SGI IRIX 6.0.1 - 'colorview' Read Files
https://notcve.org/view.php?id=CVE-1999-1494
colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument. • https://www.exploit-db.com/exploits/19269 ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P http://www.securityfocus.com/archive/1/675 http://www.securityfocus.com/bid/336 http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html https://exchange.xforce.ibmcloud.com/vulnerabilities/2112 •
CVE-1999-1468
https://notcve.org/view.php?id=CVE-1999-1468
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •