First published: Wed May 07 1997(Updated: )
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =5.3 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.2 | |
=5.3 | ||
=6.1 | ||
=6.2 | ||
=6.3 | ||
=6.4 | ||
=6.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1461 is considered a critical vulnerability due to its potential to allow local users to gain root access.
To fix CVE-1999-1461, ensure that the PATH variable does not point to untrusted locations and consider updating to a patched version of IRIX.
CVE-1999-1461 affects IRIX versions 5.3 through 6.5.10 including 6.1, 6.2, 6.3, 6.4, and 6.5.10.
CVE-1999-1461 can be exploited by local users who have access to modify the PATH environment variable.
The vulnerability in CVE-1999-1461 revolves around the inpview utility's reliance on the PATH variable to execute the ttsession program.