Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0959: IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.

0
High
VulnerabilityCVE-1999-0959cve-1999-0959
Published: Sat Feb 01 1997 (02/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:10:47 UTC

Technical Analysis

CVE-1999-0959 is a high-severity local privilege vulnerability affecting the IRIX operating system, specifically versions 5 through 6.4. The vulnerability resides in the 'startmidi' program, which is part of the IRIX multimedia subsystem. The flaw allows local users to perform a symlink (symbolic link) attack to modify arbitrary files on the system. Essentially, the 'startmidi' program does not securely handle temporary files or file paths, enabling an attacker with local access to create symbolic links pointing to sensitive files. When 'startmidi' operates on these symlinks, it inadvertently overwrites or modifies the target files, potentially leading to unauthorized changes in system files or user data. This vulnerability impacts confidentiality, integrity, and availability because it can be exploited to alter critical system files, escalate privileges, or disrupt system operations. The CVSS v2 score is 7.2, indicating high severity, with the vector AV:L/AC:L/Au:N/C:C/I:C/A:C meaning it requires local access, low attack complexity, no authentication, and impacts confidentiality, integrity, and availability fully. Although no known exploits in the wild have been reported, the availability of patches from SGI indicates that the vendor addressed the issue. The vulnerability is significant for environments still running legacy IRIX systems, which are rare today but may exist in specialized industrial or research contexts.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those maintaining legacy IRIX systems, often found in niche sectors such as scientific research, industrial control, or media production where SGI hardware and software were historically used. Exploitation could allow local attackers—such as disgruntled employees or contractors with system access—to modify critical files, potentially leading to system compromise, data corruption, or denial of service. This could disrupt operations, cause data loss, or facilitate further privilege escalation attacks. While the threat is limited by the requirement for local access and the obsolescence of IRIX, organizations relying on these systems for legacy applications or data processing must consider the risk. Failure to patch could expose sensitive data or critical infrastructure components to unauthorized modification, impacting operational continuity and compliance with data integrity standards.

Mitigation Recommendations

Organizations should immediately verify whether any IRIX systems in their environment are running affected versions (5 through 6.4). If so, they must apply the official patches provided by SGI, available at the referenced FTP links. Since IRIX is an outdated OS, consider isolating these systems on segmented networks with strict access controls to limit local user access. Implement strict user account management to minimize the number of users with local login privileges. Employ file integrity monitoring on critical files to detect unauthorized modifications. Additionally, consider migrating legacy workloads to modern, supported platforms to eliminate exposure to this and other legacy vulnerabilities. Regularly audit and monitor system logs for suspicious activity related to 'startmidi' or file modifications. Finally, educate local users about the risks of symlink attacks and enforce least privilege principles to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de644

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 12:10:47 PM

Last updated: 2/7/2026, 2:06:38 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats