Vulnerability Name:

CVE-1999-1494 (CCN-2112)

Assigned:1994-08-09
Published:1994-08-09
Updated:2017-10-10
Summary:colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: SGI Security Advisory 19950209-01-P
colorview program allows reading of any file

Source: SGI
Type: Patch, Vendor Advisory
19950209-00-P

Source: CCN
Type: BugTraq Mailing List, Tue, 9 Aug 1994 11:03:04 -0400
Re: IRIX 5.2 Security Advisory

Source: CCN
Type: BugTraq Mailing List, Tue, 07 Mar 1995 15:26:14 +1000
sigh. another Irix 5.2 hole.

Source: MITRE
Type: CNA
CVE-1999-1494

Source: CCN
Type: OSVDB ID: 979
IRIX colorview -text Argument Arbitrary File Read

Source: BUGTRAQ
Type: Vendor Advisory
19940809 Re: IRIX 5.2 Security Advisory

Source: BID
Type: Exploit, Patch, Vendor Advisory
336

Source: CCN
Type: BID-336
IRIX colorview Vulnerability

Source: BUGTRAQ
Type: Patch, Vendor Advisory
19950307 sigh. another Irix 5.2 hole.

Source: XF
Type: UNKNOWN
sgi-colorview(2112)

Source: XF
Type: UNKNOWN
sgi-colorview(2112)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sgi irix 5.1
    sgi irix 5.1.1
    sgi irix 5.2
    sgi irix 6.0
    sgi irix 6.0.1
    sgi irix 5.2
    sgi irix 6.0.1
    sgi irix 6.0
    sgi irix 5.1
    sgi irix 5.1.1