First published: Sat Jan 04 1997(Updated: )
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | <=6.4 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.2 | |
<=6.4 | ||
=5.3 | ||
=6.0 | ||
=6.0.1 | ||
=6.1 | ||
=6.2 | ||
=6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1120 has a high severity rating due to its potential to allow local users to gain elevated privileges.
To fix CVE-1999-1120, ensure that the PATH variable is properly restricted or modify the disable program to validate the execution environment.
CVE-1999-1120 affects SGI IRIX versions 5.3 through 6.4 inclusive.
Local users of SGI IRIX systems can exploit CVE-1999-1120 to gain unauthorized privileges.
The main issue in CVE-1999-1120 is the trust in the PATH environmental variable, which allows local users to execute unauthorized programs.