CVE-2002-0652 – SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution
https://notcve.org/view.php?id=CVE-2002-0652
xfsmd for IRIX 6.5 through 6.5.16 allows remote attackers to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs(). • https://www.exploit-db.com/exploits/21571 ftp://patches.sgi.com/support/free/security/advisories/20020605-01-I ftp://patches.sgi.com/support/free/security/advisories/20020606-01-I http://marc.info/?l=bugtraq&m=102459162909825&w=2 •
CVE-2002-0042
https://notcve.org/view.php?id=CVE-2002-0042
Vulnerability in the XFS file system for SGI IRIX before 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS. • ftp://patches.sgi.com/support/free/security/advisories/20020402-01-P http://www.iss.net/security_center/static/8839.php http://www.securityfocus.com/bid/4511 •
CVE-2002-0357
https://notcve.org/view.php?id=CVE-2002-0357
Unknown vulnerability in rpc.passwd in the nfs.sw.nis subsystem of SGI IRIX 6.5.15 and earlier allows local users to gain root privileges. • ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P http://www.ciac.org/ciac/bulletins/m-087.shtml http://www.iss.net/security_center/static/9261.php http://www.kb.cert.org/vuls/id/430419 http://www.osvdb.org/834 http://www.securityfocus.com/bid/4939 •
CVE-2002-0358
https://notcve.org/view.php?id=CVE-2002-0358
MediaMail and MediaMail Pro in SGI IRIX 6.5.16 and earlier allows local users to force the program to dump core via certain arguments, which could allow the users to read sensitive data or gain privileges. • ftp://patches.sgi.com/support/free/security/advisories/20020602-01-I http://www.iss.net/security_center/static/9292.php http://www.securityfocus.com/bid/4959 •
CVE-2002-0355
https://notcve.org/view.php?id=CVE-2002-0355
netstat in SGI IRIX before 6.5.12 allows local users to determine the existence of files on the system, even if the users do not have the appropriate permissions. • ftp://patches.sgi.com/support/free/security/advisories/20020503-01-I http://www.iss.net/security_center/static/9023.php http://www.securityfocus.com/bid/4682 •