First published: Wed Jul 03 2002(Updated: )
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.9f | |
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.5.4m | |
SGI IRIX | =6.5.3f | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.14f | |
SGI IRIX | =6.5.4f | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.13m | |
SGI IRIX | =6.5.9m | |
SGI IRIX | =6.5.12 | |
SGI IRIX | =6.5.10m | |
SGI IRIX | =6.5.15f | |
SGI IRIX | =6.5.7m | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5.13f | |
SGI IRIX | =6.5.2f | |
SGI IRIX | =6.5.2m | |
SGI IRIX | =6.5.15 | |
SGI IRIX | =6.5.8m | |
SGI IRIX | =6.5.12f | |
SGI IRIX | =6.5.6f | |
SGI IRIX | =6.5.7f | |
SGI IRIX | =6.5.14m | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =6.5.14 | |
SGI IRIX | =6.5.3m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.15m | |
SGI IRIX | =6.5.11f | |
SGI IRIX | =6.5.11 | |
SGI IRIX | =6.5.11m | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.5.6m | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5.8f | |
SGI IRIX | =6.5.5f | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =6.2 | |
SGI IRIX | =6.5.10f | |
SGI IRIX | =6.5.5m | |
SGI IRIX | =6.5.13 | |
SGI IRIX | =6.5.12m | |
SGI IRIX | =6.5.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0359 is considered a high severity vulnerability due to its potential to allow remote attackers to gain root privileges.
To mitigate CVE-2002-0359, upgrade to a patched version of IRIX that addresses the weak authentication issue.
CVE-2002-0359 can lead to unauthorized access and manipulation of file systems, compromising system integrity.
CVE-2002-0359 affects IRIX versions 6.5 through 6.5.16.
CVE-2002-0359 allows attackers to execute dangerous RPC functions, potentially leading to system takeover.