Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0765: SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.

0
High
VulnerabilityCVE-1999-0765cve-1999-0765
Published: Wed May 19 1999 (05/19/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.

AI-Powered Analysis

AILast updated: 06/27/2025, 23:11:18 UTC

Technical Analysis

CVE-1999-0765 is a critical vulnerability found in the SGI IRIX operating system, specifically affecting version 6.0 of the midikeys program. The midikeys program allows local users to invoke a text editor in a manner that enables them to modify arbitrary files on the system. This vulnerability arises because the program does not properly restrict the files that can be edited, thereby permitting unauthorized file modifications. The vulnerability has a CVSS score of 10.0, indicating a critical severity level with the vector AV:N/AC:L/Au:N/C:C/I:C/A:C, meaning it can be exploited remotely without authentication, with low attack complexity, and results in complete confidentiality, integrity, and availability compromise. Although the vulnerability is local in nature (requiring local user access), the CVSS vector suggests network attack vector, which may be a data inconsistency; however, the description and typical IRIX environment imply local exploitation. Exploiting this vulnerability allows an attacker to overwrite or alter any file on the system, potentially leading to privilege escalation, system compromise, or denial of service. A patch addressing this vulnerability is available from SGI, distributed via their security advisories. No known exploits have been reported in the wild, but the severity and nature of the vulnerability make it a significant risk if unpatched.

Potential Impact

For European organizations still operating legacy SGI IRIX systems, this vulnerability poses a severe risk. The ability for a local user to modify arbitrary files can lead to unauthorized access, data breaches, and system integrity loss. Critical infrastructure or research institutions using IRIX for specialized applications could face operational disruptions or data corruption. Given the age of the vulnerability (published in 1999), most organizations have likely migrated away from IRIX; however, any remaining systems are at high risk. The impact includes potential exposure of sensitive data, unauthorized privilege escalation, and complete system compromise. This could affect confidentiality, integrity, and availability of critical systems, leading to financial loss, reputational damage, and regulatory non-compliance under European data protection laws.

Mitigation Recommendations

Organizations should immediately verify if any SGI IRIX 6.0 systems are in use within their environment. If so, they must apply the official patches provided by SGI as referenced in the advisories (ftp://patches.sgi.com/support/free/security/advisories/19990501-01-A). Given the age and rarity of the platform, consider isolating these systems from the network to limit local user access and reduce attack surface. Implement strict access controls and monitoring on IRIX systems to detect unauthorized file modifications. If possible, migrate critical workloads to modern, supported operating systems to eliminate exposure. Additionally, conduct regular audits of file integrity on these systems and restrict the use of the midikeys program to trusted administrators only. Employ host-based intrusion detection systems tailored for legacy environments to alert on suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df015

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 11:11:18 PM

Last updated: 2/7/2026, 2:07:17 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats