Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0022: Local user gains root privileges via buffer overflow in rdist, via expstr() function.

0
High
VulnerabilityCVE-1999-0022cve-1999-0022buffer overflowcwe-125
Published: Wed Jul 03 1996 (07/03/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

Local user gains root privileges via buffer overflow in rdist, via expstr() function.

AI-Powered Analysis

AILast updated: 07/01/2025, 15:15:12 UTC

Technical Analysis

CVE-1999-0022 is a high-severity local privilege escalation vulnerability affecting the rdist utility on SGI IRIX operating systems. The vulnerability arises from a buffer overflow in the expstr() function within rdist. Rdist is a remote file distribution tool used to synchronize files across systems. The buffer overflow occurs when the expstr() function improperly handles input strings, allowing a local user to overwrite memory beyond the intended buffer boundaries. Exploiting this flaw enables a local attacker with limited privileges to execute arbitrary code with root privileges, effectively gaining full control over the affected system. The vulnerability affects multiple versions of IRIX, ranging from 5.0 through 6.4, as well as various versions of rdist itself. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. Although the vulnerability was published in 1996 and no official patch is available, it remains a critical risk on legacy systems still running these versions. No known exploits are currently observed in the wild, but the nature of the vulnerability makes it a prime candidate for local privilege escalation attacks if attackers gain local access.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in environments where legacy SGI IRIX systems are still in use, such as in specialized industrial, scientific, or research settings. Successful exploitation would allow attackers to escalate privileges from a local user to root, compromising system confidentiality, integrity, and availability. This could lead to unauthorized data access, system manipulation, and potential pivoting to other networked systems. Given the age of the vulnerability and the niche deployment of IRIX, the risk is limited to organizations maintaining legacy infrastructure. However, in critical sectors such as research institutions, manufacturing plants, or media companies relying on IRIX-based systems, the impact could be severe, including operational disruption and data breaches.

Mitigation Recommendations

Since no official patch is available, European organizations should consider the following specific mitigations: 1) Decommission or isolate legacy IRIX systems running vulnerable rdist versions to prevent local access by untrusted users. 2) Restrict local user accounts and enforce strict access controls and monitoring on affected systems to limit potential exploitation. 3) Employ application whitelisting or mandatory access control mechanisms to prevent unauthorized execution of rdist or related binaries. 4) Use system integrity monitoring tools to detect anomalous behavior indicative of exploitation attempts. 5) If continued use is necessary, consider recompiling rdist from source with added bounds checking or applying community-developed patches if available. 6) Conduct regular audits of user privileges and system logs to detect suspicious activity. 7) Educate system administrators about the risks of legacy software and encourage migration to supported platforms.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de4ef

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 3:15:12 PM

Last updated: 2/5/2026, 12:31:30 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats