CVE-1999-0049
https://notcve.org/view.php?id=CVE-1999-0049
Csetup under IRIX allows arbitrary file creation or overwriting. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0049 •
CVE-1999-0051 – SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. • https://www.exploit-db.com/exploits/19066 https://www.exploit-db.com/exploits/19067 https://www.exploit-db.com/exploits/19350 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0051 •
CVE-1999-1120 – SGI IRIX 6.4 - 'netprint' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1120
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420403&w=2 http://www.osvdb.org/993 http://www.securityfocus.com/bid/395 https://exchange.xforce.ibmcloud.com/vulnerabilities/2107 •
CVE-1999-1401
https://notcve.org/view.php?id=CVE-1999-1401
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). • ftp://patches.sgi.com/support/free/security/advisories/19961201-01-PX http://www.iss.net/security_center/static/7575.php http://www.osvdb.org/8563 http://www.securityfocus.com/bid/463 •
CVE-1999-1384 – SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I http://marc.info/?l=bugtraq&m=87602167420095&w=2 http://www.iss.net/security_center/static/7456.php http://www.securityfocus.com/bid/470 •