CVE-1999-1409 – NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at' Read File
https://notcve.org/view.php?id=CVE-1999-1409
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. • https://www.exploit-db.com/exploits/19261 ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc http://marc.info/?l=bugtraq&m=90233906612929&w=2 http://www.iss.net/security_center/static/7577.php http://www.securityfocus.com/bid/331 http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html •
CVE-1999-0329
https://notcve.org/view.php?id=CVE-1999-0329
SGI mediad program allows local users to gain root access. • ftp://patches.sgi.com/support/free/security/advisories/19980602-01-PX •
CVE-1999-1040
https://notcve.org/view.php?id=CVE-1999-1040
Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable. • ftp://patches.sgi.com/support/free/security/advisories/19980501-01-P2869 http://ciac.llnl.gov/ciac/bulletins/i-055.shtml http://marc.info/?l=bugtraq&m=89217373930054&w=2 •
CVE-1999-0009 – ISC BIND (Linux/BSD) - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •
CVE-1999-1501
https://notcve.org/view.php?id=CVE-1999-1501
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands. • http://marc.info/?l=bugtraq&m=89217373930054&w=2 http://www.securityfocus.com/bid/70 http://www.securityfocus.com/bid/71 •