Skip to main content

CVE-1999-0036: IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.

High
VulnerabilityCVE-1999-0036cve-1999-0036cwe-434
Published: Mon May 26 1997 (05/26/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.

AI-Powered Analysis

AILast updated: 07/01/2025, 08:41:52 UTC

Technical Analysis

CVE-1999-0036 is a high-severity vulnerability affecting the IRIX operating system's login program developed by Silicon Graphics, Inc. (SGI). This vulnerability arises when the login program is configured with a nonzero LOCKOUT parameter. Under these conditions, the login program improperly handles file operations, allowing an attacker to create or damage arbitrary files on the system. The flaw is categorized under CWE-434, which pertains to uncontrolled file upload vulnerabilities, indicating that the login process can be manipulated to write files without proper validation or restrictions. The affected IRIX versions range from 5.1 through 6.4, covering multiple releases of this UNIX-based operating system. The CVSS 3.1 base score of 8.4 reflects a high severity level, with the vector indicating that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H) fully. This means an attacker with local access can exploit this vulnerability without authentication or user interaction, leading to complete compromise of the system's data and functionality. Although no known exploits are currently observed in the wild, the availability of patches from SGI (ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX) means that affected systems can be remediated. Given the age of this vulnerability (published in 1997) and the legacy nature of IRIX systems, exploitation scenarios are likely limited to environments still running these older systems, such as specialized industrial or research setups.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether they operate legacy IRIX systems. In sectors such as scientific research, media production, or industrial control where IRIX might still be in use, exploitation could lead to unauthorized file creation or modification, resulting in data corruption, system instability, or complete system compromise. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or destroyed, and critical services could be disrupted. This could affect compliance with European data protection regulations such as GDPR if personal or sensitive data is involved. Additionally, the ability to damage files could lead to operational downtime, impacting business continuity. However, given the obsolescence of IRIX, the overall risk to most European enterprises is low unless they maintain legacy infrastructure.

Mitigation Recommendations

Organizations should first identify any IRIX systems in their environment, particularly versions 5.1 through 6.4. Immediate mitigation involves applying the official patches provided by SGI (available via the provided FTP links). If patching is not feasible due to system constraints, organizations should isolate affected IRIX systems from untrusted networks and restrict local access to trusted personnel only. Implement strict access controls and monitoring on these systems to detect any unauthorized file creation or modification attempts. Additionally, consider migrating critical workloads from IRIX to modern, supported operating systems to eliminate exposure to this and other legacy vulnerabilities. Regularly audit legacy systems for compliance with security policies and maintain up-to-date backups to recover from potential file damage.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de6df

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 8:41:52 AM

Last updated: 8/14/2025, 4:19:43 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats