Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0083: getcwd() file descriptor leak in FTP.

0
Medium
VulnerabilityCVE-1999-0083cve-1999-0083
Published: Wed Jun 11 1997 (06/11/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

getcwd() file descriptor leak in FTP.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:55:05 UTC

Technical Analysis

CVE-1999-0083 describes a vulnerability in the getcwd() function implementation within the FTP service on SGI's IRIX operating system. The flaw involves a file descriptor leak, where the getcwd() function fails to properly close or manage file descriptors during its operation. This leak can cause the FTP server process to consume file descriptors unnecessarily, potentially leading to resource exhaustion. Although the vulnerability does not directly allow for unauthorized access or modification of data, it can expose partial information about the current working directory (confidentiality impact) due to the way getcwd() operates. The CVSS score of 5.0 (medium severity) reflects that the vulnerability is remotely exploitable over the network without authentication (AV:N, AC:L, Au:N), but only impacts confidentiality (C:P) without affecting integrity or availability. The vulnerability dates back to 1997 and affects the IRIX operating system, which is a legacy UNIX variant primarily used on SGI hardware. No patches are available, and there are no known exploits in the wild. Given the age and specificity of the affected platform, this vulnerability is largely of historical interest but could still pose risks in legacy environments that continue to run IRIX FTP services.

Potential Impact

For European organizations, the impact of this vulnerability is limited due to the obsolescence of the IRIX operating system and the niche use of SGI hardware. However, organizations that maintain legacy systems for specialized industrial, research, or media production purposes might still operate IRIX servers with FTP services enabled. In such cases, the file descriptor leak could lead to degraded service performance or denial of FTP service if the server exhausts available file descriptors. The confidentiality impact is minimal but could potentially allow attackers to glean information about directory structures. Since no integrity or availability impacts are reported, the threat is moderate. European organizations relying on legacy IRIX infrastructure should be aware of this vulnerability, especially if these systems are exposed to untrusted networks. The lack of patches means mitigation must focus on compensating controls.

Mitigation Recommendations

Given the absence of patches, European organizations should implement the following specific mitigations: 1) Disable FTP services on IRIX systems if they are not strictly necessary, replacing them with more secure file transfer protocols such as SFTP or SCP on supported platforms. 2) If FTP must be used, restrict network access to the FTP server using firewalls or network segmentation to limit exposure to trusted internal networks only. 3) Monitor file descriptor usage on IRIX FTP servers to detect abnormal increases that may indicate exploitation attempts or resource exhaustion. 4) Employ intrusion detection systems (IDS) to monitor FTP traffic for suspicious activity. 5) Consider migrating legacy IRIX workloads to modern, supported platforms to eliminate exposure to this and other legacy vulnerabilities. 6) Regularly audit legacy systems and document their security posture to ensure risks are understood and managed appropriately.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de700

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:55:05 PM

Last updated: 2/7/2026, 1:16:50 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats