h-93.sgi.irix.ordist.buffer.overrun.txt
ff5a939fdf24fd62126256c0fe3ae8074ea50d5c43cb60ffc8edd7478ea76ed0
ciac.i-060.irix.dos
66f2d2055388fb06dce4b091283e0e90d61257367eca069d34ee1620c354cd0d
ciac.i-061.sgi.irix.mediad.1m
b01864dbd8948e28b8aac8f3ada3b30a736f843e1861e61b04e4555ff838bc7a
ciac.i-062.irix.bind
7ec1758b740b5d8be8b441312afdb727739208a4d5636894b11736df9b9d192a
i-015.sgi.irix.syserr.permissions.vulnerabilities.txt
76215a7b8661b1f2bc6d19e79dcc06c769f05c9b3a9acd86fb390cf0daeb5ff1
Vulnerability information was determined using IRIX 6.2.
62164c3308d8cf718cf2a5680ee44edf52ed308430007f6dbabc9de897a44b86
Information from Silicon Graphics Inc. regarding a vulnerability in IRIX 6.3 & 6.4 mailcap.
ccbdab17349b5a0c7040cefcc1e63c8e6d09a4c8efd5820f4e3d0430921272a4
A Silicon Graphics Inc. Security Advisory addressing vulnerabilities in the IRIX webdist.cgi, handler, and wrap programs, part of the Outbox subsystem.
aff299b7b1077ec672db6025659ae4318b53ff82baf12d828c0ac5f8631d733c
Information from Silicon Graphics Inc. about vulnerabilities in the visual admin and user tool programs used in the IRIX operating systems versions 5.2, 5.3, 6.1, and 6.2. Patch information is included.
4b8b818a4b9f888d71dea8e276f4385dcf50bc5d3d3c968213fd6617323ea70c
Information about a vulnerability in the IRIX 5.3, 6.1, and 6.2 operating systems regarding the permissions tool under the IRIX desktop environment.
9e614fd7f0fa0d1b2e4d38125c4870bc4ae75768f7f775cd3ddf74beb664f8dd
Vulnerability information on the "ATT Packaging Utility" and security measures to take on all SGI systems running IRIX 5.2, 5.3, 6.0, 6.0.1, and 6.1.
c9923f804d7fa62f7c4b5506592717ec0d35b43435368a4a60b8e6b5ac632086
Vulnerability and patch information for the IRIX 5.2, 6.0, 6.0.1 Desktop Permissions Tool.
0390e56ff5e7ea0dd5ba6be34d0880d5c06e7cdb9de3a4cd9f9f3db8194dd8a9
In this advisory, we describe 6 buffer overflow problems in SGI IRIX systems. Problems affect the df, pset, eject, login/scheme, ordist, and xlock programs. Workarounds and a pointer to a wrapper are provided.
507b41b12f9f7c3cd75d5ef7d05d4de4cfbf1f277839ecedbb79566b97219947
This advisory describes a vulnerability in the SGI login program when the LOCKOUT parameter is set to a number greater than zero. The vulnerability is present in IRIX 5.3 and 6.2, and perhaps other
d2c6db2d376653840c625017a5427471d239965bb0e417c978479424dcf23966
This advisory reports a vulnerability in the webdist.cgi-bin program, part of the IRIX Mindshare Out Box package, available with IRIX 5.x and 6.x. When exploiting this vulnerability, both local and remote users may be able to execute arbitrary commands with the privileges of the httpd daemon. A workaround is included.
c9926191ee769112046a977f04b676c47268e7100f13113682f3e542cb6b97c3
A vulnerability in the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2 allows local users to create or overwrite arbitrary files on the system and ultimately gain root privileges. A workaround is provided.
416f58f59d17dbd153e723dbab1d8e7ed23d3fe6e91a316877ce82acaaaed8ab
This advisory addresses a vulnerability in the Silicon Graphics, Inc. IRIX 5.x Help system. SGI recommends installing the patch, but has provided a workaround to disable the Help system if this is not possible.
8d7248f6fac2655a5318003eafe7fdf2301b1d7f0b36d8bd5173bcd79903934b
A vulnerability is present in the default configuration of the lp software in Silicon Graphics Computer Systems (SGI) IRIX operating systems. This vulnerability is present in all versions of IRIX, prior to IRIX 4.0.5. The advisory describes how to reconfigure the lp software in order to eliminate this vulnerability.
0cf10a801a35d605f9982f7e3d5ee7402de464525ee955464d3b870e5dc1b96f
Vulnerability regarding the handling of mail messages on all Silicon Graphics IRIX Systems prior to version 4.0. The problem is fixed in version 4.0. Solution involves changing permissions and ownership of a system command.
26efe6baf0ecc4fafa8d8bf7992db1f6f331d9e9c7d0eee5d3357db53143eda3
Vulnerability in Silicon Graphics IRIX 3.3 and 3.3.1 systems. /usr/sbin/Mail has a security flaw.
0cc4b40026b2d95d4af0a2b715924cd689ab8c896c48cdde9a34f1e0a6c726cc
Second issue of the Confidence Remains High - Lots of news from the underground. Includes solaris exploits, scanning for and exploiting php.cgi, Hiding From Who, Sendmail 8.8.4 / 8.8.5 LOCAL Exploit, Ident Scanner (ident-scan.c), Windoze NT / 95 Killer : winnuke.c, Federal Bugging Frequencies, 911 Autodialler Script, Cellular Calls Without Cloning, Getting Your Exploits Onto Systems, Fakemailing Techniques, Pascal Credit Card Generator Source, in.courierd : backdoor on port 530, so1o Gets Busted by CERT, IRiX WWW Server Bugs, and Hacking Not-So-Electrical Items.
24bd87efab7f86cf7db4471a62d21f17d4c284bee23cb0ffe064fce4f018c517
Sn00py.c is a quick and dirty packet sniffer for SGI IRIX. This latest release of the super lightweight packet sniffer incorporates a 'depromiscuator' function to avoid setting off the IFF_PROMISC flag.
a9681774af5cffb916decc251ebbb88459e3147aed39a9abda4749c131d986fc
IRIX packet sniffer.
29c4a8184c2181bb25c96dff0627844f9d74a43ef819731838af2fce9574da72
A quick IRIX sniffer.
dd4e34143745204c5da3eb4abb432c57939e768265d72e78420a0c9b759b3fb4
Sniffit 0.3.7beta - Very good packet sniffer for unix. Has an interactive mode where you can select connections in progress to watch, or a mode to log packets to a file in the background. Supports a configuration file and tpcdump like packet filtering. Sniffit runs on LINUX, SunOS, Solaris, FreeBSD and IRIX.
78b5137be45bdff738525dee351908ae0b8a79e2d999e33b34278a4a7fc08ca0