CVE-1999-1143
https://notcve.org/view.php?id=CVE-1999-1143
Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •
CVE-1999-0036 – SGI IRIX - '/bin/login' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0036
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. • https://www.exploit-db.com/exploits/336 https://www.exploit-db.com/exploits/19310 ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX http://www.ciac.org/ciac/bulletins/h-106.shtml http://www.osvdb.org/990 https://exchange.xforce.ibmcloud.com/vulnerabilities/557 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-1999-1398 – SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. • https://www.exploit-db.com/exploits/19358 http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.insecure.org/sploits/irix.xfsdump.html http://www.securityfocus.com/bid/472 •
CVE-1999-1461 – SGI IRIX 6.4 - 'inpview' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1461
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •
CVE-1999-1067
https://notcve.org/view.php?id=CVE-1999-1067
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities. • http://marc.info/?l=bugtraq&m=87602167420919&w=2 •