Skip to main content

CVE-1999-0960: IRIX cdplayer allows local users to create directories in arbitrary locations via a command line opt

High
VulnerabilityCVE-1999-0960cve-1999-0960
Published: Fri Mar 20 1998 (03/20/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:10:09 UTC

Technical Analysis

CVE-1999-0960 is a high-severity local privilege vulnerability affecting the IRIX operating system's cdplayer utility, developed by Silicon Graphics, Inc. (SGI). The vulnerability arises because the cdplayer program allows local users to create directories at arbitrary locations on the filesystem via a command line option. This means that a user with local access can exploit the cdplayer's command line parsing to specify directory paths that the program will create without proper validation or authorization checks. The affected IRIX versions include 5, 6.0, 6.0.1, 6.1, 6.2, 6.3, and 6.4. The vulnerability was published in March 1998 and has a CVSS v2 base score of 7.2, indicating high severity. The CVSS vector (AV:L/AC:L/Au:N/C:C/I:C/A:C) shows that the attack requires local access (AV:L), low attack complexity (AC:L), no authentication (Au:N), and can lead to complete confidentiality, integrity, and availability compromise (C:C/I:C/A:C). Although no known exploits in the wild have been reported, the vulnerability allows local users to potentially escalate privileges or manipulate system files by creating directories in unauthorized locations. Patches are available from SGI via FTP links provided in the advisory. Given the age of this vulnerability and the IRIX platform's niche usage, exploitation would require local access to the affected system and knowledge of the vulnerability. However, the impact on confidentiality, integrity, and availability is critical if exploited, as arbitrary directory creation can be leveraged for privilege escalation or denial of service attacks.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of IRIX systems within their infrastructure. IRIX was primarily used in specialized environments such as high-performance computing, graphics workstations, and certain legacy industrial or research systems. Organizations in sectors like scientific research, media production, or industrial control that historically used SGI hardware might still have IRIX systems in operation. Exploitation of this vulnerability could allow a local attacker to escalate privileges, manipulate system files, or disrupt services by creating directories in critical filesystem locations. This could lead to unauthorized access to sensitive data, system instability, or denial of service. Although the vulnerability requires local access, insider threats or attackers who gain initial foothold through other means could leverage this flaw to deepen their control. Given the rarity of IRIX in modern environments, the overall risk to most European organizations is low, but those with legacy systems should consider the threat seriously to avoid potential compromise of critical infrastructure or intellectual property.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations still running IRIX systems should: 1) Apply the official patches provided by SGI immediately, available via the FTP links in the advisory, to ensure the cdplayer utility no longer allows arbitrary directory creation. 2) Restrict local access to IRIX systems by enforcing strict physical and network access controls, limiting the number of users who can log in locally. 3) Monitor system logs and user activity for unusual directory creation or command line usage related to cdplayer. 4) Where possible, replace or phase out legacy IRIX systems with modern, supported platforms to eliminate exposure to this and other legacy vulnerabilities. 5) Implement application whitelisting or execution restrictions to prevent unauthorized use of cdplayer or other vulnerable utilities. 6) Conduct regular security audits and vulnerability assessments on legacy systems to identify and remediate similar risks. These steps go beyond generic advice by focusing on patching, access control, monitoring, and strategic system modernization.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de938

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 4:10:09 AM

Last updated: 8/15/2025, 9:55:08 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats