exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from SGI Security Coordinator

Email addressagent99 at sgi.com
First Active2002-05-04
Last Active2004-06-18
HexView Security Advisory 2004-06-01.01
Posted Jun 18, 2004
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible.

tags | advisory, kernel, root
systems | irix
advisories | CVE-2004-0135, CVE-2004-0136, CVE-2004-0137
SHA-256 | c311575509d77e140256db203b3431dabc5c01cfb4dd8d1e624c66a52ee8d789
HexView Security Advisory 2003-08-03.01
Posted Aug 26, 2003
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20030803-01-P - A vulnerability has been reported by sendmail.org that the 8.12.8 and earlier releases shipped with a potential problem in DNS mapping that could lead to a remote denial or service or root compromise. Relatedd CVE Number: CVE-2003-0688.

tags | advisory, remote, root
SHA-256 | f599f483c03b2a7dbaa048e9abd60ad17327c2a14fc6add6523e23542a45abb1
HexView Security Advisory 2003-07-02.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030702-01-P - It has been reported that logging into an IRIX 6.5 machine while particular environment variables are set can lead to /usr/lib/iaf/scheme dumping core. Since scheme is suid root, this could potentially lead to a root compromise.

tags | advisory, root
systems | irix
SHA-256 | cf55ec3e1e580ca7b85e91d22604fd9c68c6799680b2b730027f68cf4fe308de
HexView Security Advisory 2003-07-01.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030701-01-P - Multiple vulnerabilities have been found in the Name Service Daemon, or nsd, on IRIX below version 6.5.21.

tags | advisory, vulnerability
systems | irix
advisories | CVE-2003-0176, CVE-2003-0177, CVE-2003-0572, CVE-2003-0573
SHA-256 | b6218821e51de97c515742f76bc0a7393297d398e8dfbefd71584ac16e407bec
HexView Security Advisory 2002-05-03.01
Posted May 10, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020503-01-I - A vulnerability found in netstat allows local users to detect whether a file exists, even when the permissions and ownership of that file should not allow it. This vulnerability has been corrected in IRIX 6.5.12 and patches are available.

tags | local
systems | irix
SHA-256 | ecfddfe1a5d66662e1eacb3e599522d5cc271ef9922a8b2cb650afd55c1f66d3
HexView Security Advisory 2002-04-09.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020409-01-I - A buffer overflow vulnerability found in the /usr/sbin/cpr binary (IRIX Checkpoint and Restart) can allow local user to gain root level privileges. The overflow has been fixed in SGI IRIX 6.5.11 and patches have been made available for previous versions.

tags | overflow, local, root
systems | irix
SHA-256 | 4f2b6cad39b01f6b18e6056ce1678da489b4ec172ed6d052a6b777d61347616a
HexView Security Advisory 2002-05-01.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020501-01-I - The name service daemon (nsd) contains a symlink vulnerability that can be used by local users to elevate their privileges. This vulnerability has been fixed in IRIX 6.5.11 and patches are available for older versions.

tags | local
systems | irix
SHA-256 | e21e400ab5d66314a3149dd6b20aaa81db2e5c9859e2cf50ed81e6d737e78d4a
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close