Skip to main content

CVE-1999-0313: disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using re

High
VulnerabilityCVE-1999-0313cve-1999-0313
Published: Wed Jul 01 1998 (07/01/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.

AI-Powered Analysis

AILast updated: 06/29/2025, 20:55:38 UTC

Technical Analysis

CVE-1999-0313 is a local privilege escalation vulnerability affecting the disk_bandwidth utility on SGI IRIX 6.4 S2MP systems, specifically for the Origin and Onyx2 platforms. The vulnerability arises due to improper handling of relative pathnames within the disk_bandwidth program, which allows a local user to escalate their privileges to root. This means that an unprivileged user with local access to the affected system can exploit this flaw to gain full administrative control. The vulnerability has a CVSS v2 base score of 7.2, indicating a high severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality, integrity, and availability (C:C/I:C/A:C). The flaw is rooted in the way the utility processes file paths, potentially allowing an attacker to manipulate the execution context or files accessed by disk_bandwidth, thereby executing arbitrary code with root privileges. A patch addressing this vulnerability is available from SGI, distributed via their security advisories dating back to 1998. No known exploits have been reported in the wild, likely due to the age and niche deployment of the affected systems. However, given the critical nature of the flaw, any SGI IRIX 6.4 S2MP systems still in operation remain at risk if unpatched.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy SGI IRIX 6.4 S2MP systems, which are specialized high-performance computing platforms used historically in scientific, engineering, and graphics-intensive environments. If such systems are present and accessible by multiple users, the vulnerability could allow a malicious insider or compromised local account to gain root access, leading to full system compromise. This could result in unauthorized data access, modification, or destruction, disruption of critical computational workloads, and potential pivoting to other networked systems. While the overall prevalence of SGI IRIX 6.4 S2MP in Europe is low due to the obsolescence of the platform, certain research institutions, universities, or legacy industrial environments might still rely on these systems. The impact is thus niche but severe within those contexts. Additionally, the vulnerability's exploitation does not require authentication beyond local access, increasing risk if physical or remote local access controls are weak.

Mitigation Recommendations

Organizations should first inventory their environments to identify any SGI IRIX 6.4 S2MP systems, particularly Origin and Onyx2 platforms. If such systems are found, immediate application of the official SGI patch from the 1998 security advisory is critical. Given the age of the platform, patching may require coordination with legacy system administrators or specialized support. If patching is not feasible, mitigating controls include restricting local user access to trusted personnel only, enforcing strict physical security to prevent unauthorized local access, and isolating these systems from broader networks to limit lateral movement. Monitoring and logging local user activities on these systems can help detect suspicious behavior indicative of exploitation attempts. Finally, planning for migration away from legacy SGI IRIX systems to modern, supported platforms is strongly recommended to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea11

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 8:55:38 PM

Last updated: 7/26/2025, 5:56:56 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats