First published: Wed Jul 03 1996(Updated: )
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.0.1 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =6.4 | |
SGI IRIX | =5.0 | |
SGI IRIX | =5.1 | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.2 | |
BSDI BSD/OS | =1.1 | |
Sun SunOS | =5.3 | |
HPE HP-UX | =10.00 | |
IBM AIX | =3.2.5 | |
IBM AIX | =3.2.4 | |
IBM AIX | =4.1.4 | |
IBM AIX | =4.2 | |
IBM AIX | =4.1.5 | |
FreeBSD Kernel | =2.0.5 | |
IBM AIX | =3.1 | |
IBM AIX | =4.1.1 | |
FreeBSD Kernel | =2.1.0 | |
Sun SunOS | =5.4 | |
Sun SunOS | =4.1.1 | |
IBM AIX | =4.1.2 | |
Sun SunOS | =4.1.3u1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =4.1.3 | |
IBM AIX | =4.1 | |
Sun SunOS | =5.0 | |
IBM AIX | =4.1.3 | |
Sun SunOS | =4.1.2 | |
IBM AIX | =3.2 | |
FreeBSD Kernel | =2.0 | |
Sun SunOS | =5.1 | |
Sun SunOS | =5.2 | |
SunOS | =4.1.1 | |
SunOS | =4.1.2 | |
SunOS | =4.1.3u1 | |
SunOS | =5.0 | |
SunOS | =5.1 | |
SunOS | =5.2 | |
SunOS | =5.3 | |
SunOS | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0022 is classified as a high severity vulnerability due to its ability to allow local users to gain root privileges.
To fix CVE-1999-0022, ensure that you apply the appropriate patches provided by the software vendor for the affected SGI IRIX and other operating system versions.
CVE-1999-0022 affects various versions of SGI IRIX, BSDI, FreeBSD, HP-UX, IBM AIX, and Sun Solaris.
Local users on systems with vulnerable versions of the affected operating systems can exploit CVE-1999-0022 to gain unauthorized root access.
CVE-1999-0022 exploits a buffer overflow in the rdist program's expstr() function, allowing attackers to manipulate memory and escalate their privileges.