Vulnerability Name:

CVE-1999-0030 (CCN-483)

Assigned:1997-05-01
Published:1997-05-01
Updated:2022-08-17
Summary:root privileges via buffer overflow in xlock command on SGI IRIX systems.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: AusCERT Advisory AA-97.24
SGI IRIX xlock Buffer Overrun Vulnerability

Source: CCN
Type: SGI Security Advisory 19970502-01-A
xlock program vulnerability

Source: CCN
Type: SGI Security Advisory 19970502-02-PX
xlock Vulnerability

Source: MITRE
Type: CNA
CVE-1999-0030

Source: MITRE
Type: CNA
CVE-1999-0038

Source: MITRE
Type: CNA
CVE-1999-0306

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00150
Vulnerability in xlock

Source: CCN
Type: CERT Advisory CA-1997-13
Vulnerability in xlock

Source: CCN
Type: CERT Advisory CA-1997-21
SGI Buffer Overflow Vulnerabilities

Source: CCN
Type: OSVDB ID: 941
Multiple Vendor xlock Local Overflow

Source: CCN
Type: BID-224
Multiple Vendor xlock Vulnerability

Source: XF
Type: UNKNOWN
xlock-bo(483)

Source: MISC
Type: UNKNOWN
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0030

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sgi:irix:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:ibm:aix:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.5:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.4:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.3:*:xfs:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sgi irix *
    ibm aix 3.2
    ibm aix 4.1
    ibm aix 4.2
    windriver bsdos 2.1
    sgi irix 6.4
    sun solaris 2.3
    sun solaris 2.5.1
    sun solaris 2.5
    sun solaris 2.5.1
    sun solaris 2.4
    sun sunos 4.1.4
    sun solaris 1.0
    sun sunos 4.1.3u1
    data_general dg ux *
    freebsd freebsd *
    sgi irix 5.2
    sgi irix 5.3
    sgi irix 6.0.1
    sgi irix 6.1
    sgi irix 6.2
    sgi irix 6.3
    sgi irix 6.0
    debian debian linux *
    suse suse linux *
    sgi irix 5.0.1
    sgi irix 5.1
    sgi irix 5.1.1
    sgi irix 5.3
    sgi irix 5.0