Vulnerability Name:

CVE-1999-1468 (CCN-7160)

Assigned:1991-04-23
Published:1991-04-23
Updated:2008-09-10
Summary:rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
CVSS v3 Severity:8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.2 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-1999-1468

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00110
Vulnerability with the rdist(1) command

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00113
rdist can be used to create a setuid root shell.

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00115
rdist

Source: CCN
Type: 8lgm Advisory #01
[8lgm]-Advisory-1.UNIX.rdist.23-Apr-1991

Source: MISC
Type: UNKNOWN
http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html

Source: CCN
Type: CERT Advisory CA-1991-20
/usr/ucb/rdist Vulnerability

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-91.20

Source: XF
Type: UNKNOWN
rdist-popen-gain-privileges(7160)

Source: OSVDB
Type: UNKNOWN
8106

Source: CCN
Type: OSVDB ID: 8106
Multiple UNIX Vendor rdist popen IFS Variable Privilege Escalation

Source: BID
Type: Patch, Vendor Advisory
31

Source: CCN
Type: BID-31
Multiple Vendor rdist(1) Vulnerability (1991)

Source: XF
Type: UNKNOWN
rdist-popen-gain-privileges(7160)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:next:next:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:next:next:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:3.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:4.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:cray:unicos:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:6.0e:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.0.3c:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sgi:irix:*:*:*:*:*:*:*:*
  • OR cpe:/o:next:nextstep:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    next next 2.0
    next next 2.1
    sgi irix 3.3
    sgi irix 3.3.1
    sgi irix 3.3.2
    sgi irix 3.3.3
    sgi irix 4.0
    cray unicos 6.0
    cray unicos 6.0e
    cray unicos 6.1
    sun sunos 4.0.3
    sun sunos 4.0.3c
    sun sunos 4.1
    sun sunos 4.1.1
    sun sunos 4.1psr_a
    sgi irix *
    next nextstep *
    sun sunos 4.0.3
    sun sunos 4.1
    sun sunos 4.1.1
    cray unicos *