Skip to main content

CVE-1999-0765: SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.

High
VulnerabilityCVE-1999-0765cve-1999-0765
Published: Wed May 19 1999 (05/19/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.

AI-Powered Analysis

AILast updated: 06/27/2025, 23:11:18 UTC

Technical Analysis

CVE-1999-0765 is a critical vulnerability found in the SGI IRIX operating system, specifically affecting version 6.0 of the midikeys program. The midikeys program allows local users to invoke a text editor in a manner that enables them to modify arbitrary files on the system. This vulnerability arises because the program does not properly restrict the files that can be edited, thereby permitting unauthorized file modifications. The vulnerability has a CVSS score of 10.0, indicating a critical severity level with the vector AV:N/AC:L/Au:N/C:C/I:C/A:C, meaning it can be exploited remotely without authentication, with low attack complexity, and results in complete confidentiality, integrity, and availability compromise. Although the vulnerability is local in nature (requiring local user access), the CVSS vector suggests network attack vector, which may be a data inconsistency; however, the description and typical IRIX environment imply local exploitation. Exploiting this vulnerability allows an attacker to overwrite or alter any file on the system, potentially leading to privilege escalation, system compromise, or denial of service. A patch addressing this vulnerability is available from SGI, distributed via their security advisories. No known exploits have been reported in the wild, but the severity and nature of the vulnerability make it a significant risk if unpatched.

Potential Impact

For European organizations still operating legacy SGI IRIX systems, this vulnerability poses a severe risk. The ability for a local user to modify arbitrary files can lead to unauthorized access, data breaches, and system integrity loss. Critical infrastructure or research institutions using IRIX for specialized applications could face operational disruptions or data corruption. Given the age of the vulnerability (published in 1999), most organizations have likely migrated away from IRIX; however, any remaining systems are at high risk. The impact includes potential exposure of sensitive data, unauthorized privilege escalation, and complete system compromise. This could affect confidentiality, integrity, and availability of critical systems, leading to financial loss, reputational damage, and regulatory non-compliance under European data protection laws.

Mitigation Recommendations

Organizations should immediately verify if any SGI IRIX 6.0 systems are in use within their environment. If so, they must apply the official patches provided by SGI as referenced in the advisories (ftp://patches.sgi.com/support/free/security/advisories/19990501-01-A). Given the age and rarity of the platform, consider isolating these systems from the network to limit local user access and reduce attack surface. Implement strict access controls and monitoring on IRIX systems to detect unauthorized file modifications. If possible, migrate critical workloads to modern, supported operating systems to eliminate exposure. Additionally, conduct regular audits of file integrity on these systems and restrict the use of the midikeys program to trusted administrators only. Employ host-based intrusion detection systems tailored for legacy environments to alert on suspicious activities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df015

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 11:11:18 PM

Last updated: 7/31/2025, 9:47:17 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats