CVE-1999-1286 – SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1286
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.osvdb.org/8560 http://www.securityfocus.com/bid/330 https://exchange.xforce.ibmcloud.com/vulnerabilities/1433 •
CVE-1999-1398 – SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. • https://www.exploit-db.com/exploits/19358 http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.insecure.org/sploits/irix.xfsdump.html http://www.securityfocus.com/bid/472 •
CVE-1999-1461 – SGI IRIX 6.4 - 'inpview' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1461
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •
CVE-1999-1067
https://notcve.org/view.php?id=CVE-1999-1067
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities. • http://marc.info/?l=bugtraq&m=87602167420919&w=2 •
CVE-1999-0039 – SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution
https://notcve.org/view.php?id=CVE-1999-0039
webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. • https://www.exploit-db.com/exploits/19299 ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX http://www.cert.org/advisories/CA-1997-12.html http://www.osvdb.org/235 http://www.securityfocus.com/bid/374 https://exchange.xforce.ibmcloud.com/vulnerabilities/333 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •