CVE-2000-0733 – IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String
https://notcve.org/view.php?id=CVE-2000-0733
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. • https://www.exploit-db.com/exploits/20149 ftp://sgigate.sgi.com/security/20000801-02-P http://archives.neohapsis.com/archives/bugtraq/2000-08/0154.html http://www.securityfocus.com/bid/1572 •
CVE-2000-0794 – SGI IRIX 6.2 - 'libgl.so' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0794
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview. • https://www.exploit-db.com/exploits/20127 http://www.iss.net/security_center/static/5063.php http://www.osvdb.org/8568 http://www.securityfocus.com/bid/1527 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200008021924.e72JOVs12558%40ix.put.poznan.pl •
CVE-2000-0798 – IRIX 6.2/6.3/6.4 - xfs truncate() Privilege Check
https://notcve.org/view.php?id=CVE-2000-0798
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files. • https://www.exploit-db.com/exploits/20137 http://www.osvdb.org/8569 http://www.securityfocus.com/bid/1540 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200008021924.e72JOVs12558%40ix.put.poznan.pl •
CVE-2000-0579
https://notcve.org/view.php?id=CVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0204.html http://www.securityfocus.com/bid/1413 •
CVE-2000-0283
https://notcve.org/view.php?id=CVE-2000-0283
The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon. • http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html http://www.securityfocus.com/bid/1106 •