First published: Fri Apr 08 2005(Updated: )
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.9f | |
SGI IRIX | =6.5.16m | |
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.5.4m | |
SGI IRIX | =4.0.5_iop | |
SGI IRIX | =6.5.17f | |
SGI IRIX | =6.5.3f | |
SGI IRIX | =4.0 | |
SGI IRIX | =3.3.2 | |
SGI IRIX | =4.0.5h | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.14f | |
SGI IRIX | =4.0.4 | |
SGI IRIX | =6.5.4f | |
SGI IRIX | =4.0.1 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.17 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.5.13m | |
SGI IRIX | =3.3.1 | |
SGI IRIX | =6.5.9m | |
SGI IRIX | =6.5.12 | |
SGI IRIX | =6.5.10m | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =4.0.5e | |
SGI IRIX | =6.5.15f | |
SGI IRIX | =4.0.3 | |
SGI IRIX | =6.5.18f | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =6.5.19f | |
SGI IRIX | =6.5.21 | |
SGI IRIX | =6.5.21f | |
SGI IRIX | =4.0.5a | |
SGI IRIX | =6.5.7m | |
SGI IRIX | =3.3.3 | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5.21m | |
SGI IRIX | =6.5.19 | |
SGI IRIX | =6.5.16f | |
SGI IRIX | =6.5.13f | |
SGI IRIX | =6.5.20 | |
SGI IRIX | =6.5.17m | |
SGI IRIX | =4.0.5_ipr | |
SGI IRIX | =6.5.20m | |
SGI IRIX | =6.5.2f | |
SGI IRIX | =5.0 | |
SGI IRIX | =6.5.2m | |
SGI IRIX | =6.5.15 | |
SGI IRIX | =6.5.8m | |
SGI IRIX | =6.5.12f | |
SGI IRIX | =6.5.6f | |
SGI IRIX | =4.0.1t | |
SGI IRIX | =6.5.7f | |
SGI IRIX | =6.5.14m | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =5.1 | |
SGI IRIX | =6.5.14 | |
SGI IRIX | =4.0.5f | |
SGI IRIX | =6.5.3m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =4.0.5b | |
SGI IRIX | =6.5.19m | |
SGI IRIX | =6.5.20f | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =4.0.5g | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.15m | |
SGI IRIX | =6.5.11f | |
SGI IRIX | =6.5_20 | |
SGI IRIX | =6.5.11 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.5.11m | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.5.6m | |
SGI IRIX | =4.0.5 | |
SGI IRIX | =3.3 | |
SGI IRIX | =4.0.4b | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5.8f | |
SGI IRIX | =6.5.5f | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =6.5.18 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.5.18m | |
SGI IRIX | =6.5.22 | |
SGI IRIX | =6.2 | |
SGI IRIX | =4.0.2 | |
SGI IRIX | =4.0.4t | |
SGI IRIX | =6.5.10f | |
SGI IRIX | =6.5.5m | |
SGI IRIX | =6.5.13 | |
SGI IRIX | =6.5.12m | |
SGI IRIX | =6.5.16 | |
SGI IRIX | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0465 is classified as a medium severity vulnerability that allows local users to overwrite arbitrary files.
To remediate CVE-2005-0465, update the SGI IRIX system to a patched version that resolves the privilege escalation issue.
CVE-2005-0465 affects SGI IRIX versions 5.0, 5.1, 5.2, 5.3, and various 6.x versions including 6.0.1 to 6.5.22.
CVE-2005-0465 is a local privilege escalation vulnerability due to improper handling of file operations.
CVE-2005-0465 can be exploited by local users on an affected SGI IRIX system to overwrite files.