First published: Wed May 28 1997(Updated: )
Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | <=6.0 | |
SGI IRIX | =6.4 | |
SGI IRIX | =5 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.2 | |
<=6.0 | ||
=5 | ||
=6.0 | ||
=6.0.1 | ||
=6.1 | ||
=6.2 | ||
=6.3 | ||
=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1143 is considered a high severity vulnerability due to the potential for local privilege escalation.
To fix CVE-1999-1143, ensure that you upgrade SGI IRIX to a patched version that mitigates this vulnerability.
CVE-1999-1143 affects local users on SGI IRIX versions 6.x and earlier, including 5.x.
The main risk of CVE-1999-1143 is that it allows local users to gain elevated privileges, which can lead to unauthorized access to sensitive information.
As a workaround, you can limit access to setuid and setgid programs until the system is upgraded to a secure version.