First published: Wed May 29 2002(Updated: )
nsd on SGI IRIX before 6.5.11 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the nsd.dump file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0174 is classified as a high severity vulnerability due to its potential to allow local users to gain root privileges.
To fix CVE-2002-0174, upgrade SGI IRIX to version 6.5.11 or later, which addresses the symlink attack vulnerability.
CVE-2002-0174 affects SGI IRIX versions 6.5.1 to 6.5.10.
A symlink attack in CVE-2002-0174 involves creating a symbolic link to overwrite the nsd.dump file, potentially allowing privilege escalation.
CVE-2002-0174 is exploitable locally by users who have access to the system.