CERTA-2001-AVI-005
Vulnerability from certfr_avis - Published: - Updated:None
Description
Le système d'internationalisation (locale subsystem) permet à un utilisateur de systèmes Unix de lire les messages du système et des applications (erreurs, programmes etc.) dans sa langue. Il est installé par défaut pour tous les systèmes SGI Irix. Une vulnérabilité du type format string permet à un utilisateur local mal intentionné d'obtenir les privilèges root.
Solution
SGI ne fourni pas de correctif et recommande de passer à la version de SGI Irix 6.5.10 car elle n'est pas vulnérable.
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI Irix Versions inférieures à 6.5.10.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eSGI Irix Versions inf\u00e9rieures \u00e0 6.5.10.\u003c/P\u003e",
"content": "## Description\n\nLe syst\u00e8me d\u0027internationalisation (locale subsystem) permet \u00e0 un\nutilisateur de syst\u00e8mes Unix de lire les messages du syst\u00e8me et des\napplications (erreurs, programmes etc.) dans sa langue. Il est install\u00e9\npar d\u00e9faut pour tous les syst\u00e8mes SGI Irix. Une vuln\u00e9rabilit\u00e9 du type\nformat string permet \u00e0 un utilisateur local mal intentionn\u00e9 d\u0027obtenir\nles privil\u00e8ges root.\n\n## Solution\n\nSGI ne fourni pas de correctif et recommande de passer \u00e0 la version de\nSGI Irix 6.5.10 car elle n\u0027est pas vuln\u00e9rable.\n\n http://support.sgi.com/colls/patches/tools/relstream/index.html\n",
"cves": [],
"links": [
{
"title": "L\u0027avis de s\u00e9curit\u00e9 de SGI :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20000901-01-A"
}
],
"reference": "CERTA-2001-AVI-005",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2001-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Acc\u00e8s root en local"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 du syst\u00e8me d\u0027internationalisation sous SGI Irix.",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 SGI",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…