Skip to main content

CVE-1999-0208: rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.

High
VulnerabilityCVE-1999-0208cve-1999-0208
Published: Tue Dec 12 1995 (12/12/1995, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.

AI-Powered Analysis

AILast updated: 07/01/2025, 15:42:58 UTC

Technical Analysis

CVE-1999-0208 is a critical remote code execution vulnerability found in the rpc.ypupdated service, which is part of the Network Information Service (NIS) implementation on SGI's IRIX operating system versions 3, 4, 5.0, 5.1, 5.2, 3.2, and 4.1. The rpc.ypupdated daemon is responsible for updating NIS maps, which are used to distribute configuration and user information across networked UNIX systems. This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the affected system by sending specially crafted requests to the rpc.ypupdated service. The vulnerability has a CVSS v2 base score of 10.0, indicating the highest severity, with an attack vector of network (AV:N), no required authentication (Au:N), and complete impact on confidentiality, integrity, and availability (C:C/I:C/A:C). Exploitation requires no user interaction and can lead to full system compromise. Despite its age, the vulnerability remains critical due to the nature of remote code execution and the lack of available patches. The affected systems are legacy IRIX versions, which are largely obsolete but may still be in use in niche or legacy environments. No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a significant risk if such systems are exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability depends primarily on the presence of legacy SGI IRIX systems running NIS services. While IRIX is largely obsolete, some research institutions, industrial control environments, or specialized legacy systems in Europe might still operate these versions. Successful exploitation could lead to complete system takeover, allowing attackers to steal sensitive data, disrupt services, or use compromised systems as footholds for lateral movement within networks. Given the full compromise potential, organizations could face data breaches, operational downtime, and reputational damage. Additionally, if such legacy systems are part of critical infrastructure or research networks, the impact could extend to broader operational disruptions. The lack of patches means organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

Since no patches are available for this vulnerability, European organizations should implement strict network segmentation to isolate any legacy IRIX systems running rpc.ypupdated from untrusted networks, especially the internet. Access to these systems should be restricted using firewalls and access control lists to allow only trusted management hosts. Disabling the rpc.ypupdated service entirely, if not required, is strongly recommended to eliminate the attack surface. If the service is necessary, consider migrating to supported systems or alternative directory services that do not have this vulnerability. Continuous monitoring and intrusion detection should be employed to detect any anomalous activity targeting these legacy systems. Additionally, organizations should conduct thorough inventories to identify any remaining IRIX systems and plan for their decommissioning or replacement to reduce long-term risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de4a2

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 3:42:58 PM

Last updated: 8/9/2025, 4:11:50 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats