Vulnerability Name: | CVE-1999-1022 (CCN-2111) | ||||||||
Assigned: | 1994-10-02 | ||||||||
Published: | 1994-10-02 | ||||||||
Updated: | 2017-12-19 | ||||||||
Summary: | serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. | ||||||||
CVSS v3 Severity: | 8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.2 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: SGI Security Advisory 19941001-01-P Visual Serial Port Manager for IRIX 4.x Source: CCN Type: BugTraq Mailing List, Sun, 2 Oct 1994 08:17:58 -1000 Re: Wanted: hackers for tiger team (new england area) Source: CCN Type: CIAC Information Bulletin F-01 SGI IRIX serial_ports Vulnerability Source: MITRE Type: CNA CVE-1999-1022 Source: MITRE Type: CNA CVE-1999-1310 Source: CCN Type: Firewall Mailing List, Wed, 2 Feb 1994 15:01:42 -1000 IRIX Race Conditions Source: CCN Type: OSVDB ID: 17058 IRIX serial_ports Race Condition Local Privilege Escalation Source: BUGTRAQ Type: Exploit, Vendor Advisory 19941002 Source: BID Type: Exploit, Patch, Vendor Advisory 464 Source: CCN Type: BID-464 IRIX serial_ports Vulnerability Source: XF Type: UNKNOWN sgi-serialports(2111) Source: XF Type: UNKNOWN sgi-serialports(2111) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |