First published: Wed Jun 23 2004(Updated: )
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.9f | |
SGI IRIX | =6.5.16m | |
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.5.4m | |
SGI IRIX | =4.0.5_iop | |
SGI IRIX | =6.5.17f | |
SGI IRIX | =6.5.3f | |
SGI IRIX | =4.0 | |
SGI IRIX | =3.3.2 | |
SGI IRIX | =4.0.5h | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.14f | |
SGI IRIX | =4.0.4 | |
SGI IRIX | =6.5.4f | |
SGI IRIX | =4.0.1 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.17 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.5.13m | |
SGI IRIX | =3.3.1 | |
SGI IRIX | =6.5.9m | |
SGI IRIX | =6.5.12 | |
SGI IRIX | =6.5.23 | |
SGI IRIX | =6.5.10m | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =4.0.5e | |
SGI IRIX | =6.5.15f | |
SGI IRIX | =4.0.3 | |
SGI IRIX | =6.5.18f | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =6.5.19f | |
SGI IRIX | =6.5.21 | |
SGI IRIX | =6.5.21f | |
SGI IRIX | =4.0.5a | |
SGI IRIX | =6.5.7m | |
SGI IRIX | =3.3.3 | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5.21m | |
SGI IRIX | =6.5.19 | |
SGI IRIX | =6.5.16f | |
SGI IRIX | =6.5.13f | |
SGI IRIX | =6.5.20 | |
SGI IRIX | =6.5.17m | |
SGI IRIX | =4.0.5_ipr | |
SGI IRIX | =6.5.20m | |
SGI IRIX | =6.5.2f | |
SGI IRIX | =5.0 | |
SGI IRIX | =6.5.2m | |
SGI IRIX | =6.5.15 | |
SGI IRIX | =6.5.8m | |
SGI IRIX | =6.5.12f | |
SGI IRIX | =6.5.6f | |
SGI IRIX | =4.0.1t | |
SGI IRIX | =6.5.7f | |
SGI IRIX | =6.5.14m | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =5.1 | |
SGI IRIX | =6.5.14 | |
SGI IRIX | =4.0.5f | |
SGI IRIX | =6.5.3m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =4.0.5b | |
SGI IRIX | =6.5.22m | |
SGI IRIX | =6.5.19m | |
SGI IRIX | =6.5.20f | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =4.0.5g | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.15m | |
SGI IRIX | =6.5.11f | |
SGI IRIX | =6.5_20 | |
SGI IRIX | =6.5.24 | |
SGI IRIX | =6.5.11 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.5.11m | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.5.6m | |
SGI IRIX | =4.0.5 | |
SGI IRIX | =3.3 | |
SGI IRIX | =4.0.4b | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5.8f | |
SGI IRIX | =6.5.5f | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =6.5.18 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.5.18m | |
SGI IRIX | =6.5.22 | |
SGI IRIX | =6.2 | |
SGI IRIX | =4.0.2 | |
SGI IRIX | =4.0.4t | |
SGI IRIX | =6.5.10f | |
SGI IRIX | =6.5.5m | |
SGI IRIX | =6.5.13 | |
SGI IRIX | =6.5.12m | |
SGI IRIX | =6.5.16 | |
SGI IRIX | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0135 is considered to have a high severity due to its potential for local privilege escalation.
CVE-2004-0135 occurs when local users exploit the syssgi SGI_IOPROBE system call, allowing them to read and write kernel memory.
CVE-2004-0135 affects IRIX versions 6.5.20 to 6.5.24, as well as earlier versions like 6.0 and 5.3.
Fixing CVE-2004-0135 involves applying the official patches provided by SGI for the affected versions of IRIX.
Any local user on systems running the vulnerable versions of IRIX is at risk of exploitation through CVE-2004-0135.