Vulnerability Name:
CVE-1999-0038 (CCN-483)
Assigned:
1997-04-26
Published:
1997-04-26
Updated:
2022-08-17
Summary:
Buffer overflow in xlock program allows local users to execute commands as root.
CVSS v3 Severity:
9.3 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.2 High
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
7.2 High
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Privileges
References:
Source: CCN
Type: AusCERT Advisory AA-97.24
SGI IRIX xlock Buffer Overrun Vulnerability
Source: CCN
Type: SGI Security Advisory 19970502-01-A
xlock program vulnerability
Source: CCN
Type: SGI Security Advisory 19970502-02-PX
xlock Vulnerability
Source: MITRE
Type: CNA
CVE-1999-0030
Source: MITRE
Type: CNA
CVE-1999-0038
Source: MITRE
Type: CNA
CVE-1999-0306
Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00150
Vulnerability in xlock
Source: CCN
Type: CERT Advisory CA-1997-13
Vulnerability in xlock
Source: CCN
Type: CERT Advisory CA-1997-21
SGI Buffer Overflow Vulnerabilities
Source: CCN
Type: OSVDB ID: 941
Multiple Vendor xlock Local Overflow
Source: CCN
Type: BID-224
Multiple Vendor xlock Vulnerability
Source: XF
Type: UNKNOWN
xlock-bo(483)
Source: MISC
Type: UNKNOWN
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038
Vulnerable Configuration:
Configuration 1
:
cpe:/a:data_general:dg_ux:3.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.3:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:5.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:1.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.0.1:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:4.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:2.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:6.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:7.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.3:*:xfs:*:*:*:*:*
Configuration 2
:
cpe:/o:sun:sunos:5.3:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.30:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:0.93:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.01:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.4:*:x86:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.00:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.5:*:x86:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:1.1:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:1.2:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:1.3:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:5.5:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.34:*:*:*:*:*:*:*
OR
cpe:/o:ibm:aix:3.2:*:*:*:*:*:*:*
OR
cpe:/o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.08:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.16:*:*:*:*:*:*:*
OR
cpe:/o:ibm:aix:4.2:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:5.4:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:10.10:*:*:*:*:*:*:*
OR
cpe:/o:ibm:aix:4.1:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:ibm:aix:3.2:*:*:*:*:*:*:*
OR
cpe:/o:ibm:aix:4.1:*:*:*:*:*:*:*
OR
cpe:/o:ibm:aix:4.2:*:*:*:*:*:*:*
OR
cpe:/o:windriver:bsdos:2.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:5.3:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.5:*:x86:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
OR
cpe:/o:sun:solaris:2.4:*:x86:*:*:*:*:*
OR
cpe:/o:sun:sunos:4.1.4:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:4.1.1:*:*:*:*:*:*:*
OR
cpe:/o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
AND
cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
OR
cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.3:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:*:*:*:*:*:*:*:*
OR
cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.0.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.3:*:xfs:*:*:*:*:*
OR
cpe:/o:sgi:irix:5.0:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
data_general
dg ux 3.0
sgi
irix 6.0.1
sgi
irix 5.3
sgi
irix 6.0.1
data_general
dg ux 5.0
sgi
irix 6.1
data_general
dg ux 1.0
sgi
irix 5.0.1
data_general
dg ux 4.0
sgi
irix 5.1.1
data_general
dg ux 2.0
sgi
irix 6.4
sgi
irix 5.0
sgi
irix 5.1
data_general
dg ux 6.0
sgi
irix 5.2
data_general
dg ux 7.0
sgi
irix 6.3
sgi
irix 6.0
sgi
irix 5.3
sun
sunos 5.3
hp
hp-ux 10.30
debian
debian linux 0.93
hp
hp-ux 10.01
sun
solaris 2.4
hp
hp-ux 10.00
sun
solaris 2.5.1
sun
solaris 2.5.1
sun
solaris 2.5
debian
debian linux 1.1
debian
debian linux 1.2
debian
debian linux 1.3
sun
sunos 5.5
sun
sunos 5.5.1
hp
hp-ux 10.20
hp
hp-ux 10.24
hp
hp-ux 10.34
ibm
aix 3.2
bsdi
bsd os 2.1
hp
hp-ux 10.08
hp
hp-ux 10.16
ibm
aix 4.2
sun
sunos 5.4
hp
hp-ux 10.10
ibm
aix 4.1
ibm
aix 3.2
ibm
aix 4.1
ibm
aix 4.2
windriver
bsdos 2.1
sgi
irix 6.4
sun
solaris 2.3
sun
solaris 2.5.1
sun
solaris 2.5
sun
solaris 2.5.1
sun
solaris 2.4
sun
sunos 4.1.4
sun
solaris 1.0
sun
sunos 4.1.3u1
data_general
dg ux *
freebsd
freebsd *
sgi
irix 5.2
sgi
irix 5.3
sgi
irix 6.0.1
sgi
irix 6.1
sgi
irix 6.2
sgi
irix 6.3
sgi
irix 6.0
debian
debian linux *
suse
suse linux *
sgi
irix 5.0.1
sgi
irix 5.1
sgi
irix 5.1.1
sgi
irix 5.3
sgi
irix 5.0