Skip to main content

CVE-1999-1067: SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive

Medium
VulnerabilityCVE-1999-1067cve-1999-1067
Published: Wed May 07 1997 (05/07/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:57:36 UTC

Technical Analysis

CVE-1999-1067 is a medium-severity vulnerability affecting the SGI MachineInfo CGI program, which is installed by default on some web servers running the IRIX operating system version 6.3. This CGI program outputs system status information that may include sensitive details about the server's configuration and environment. Because the program is accessible remotely without authentication, an attacker can query it to gather potentially sensitive information such as hardware details, software versions, and system status. This information disclosure does not directly compromise system integrity or availability but can aid attackers in reconnaissance efforts, enabling them to tailor subsequent attacks more effectively. The vulnerability is rated with a CVSS score of 5.0, reflecting its network accessibility (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impact limited to confidentiality (C:P) without affecting integrity or availability (I:N/A:N). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1997) and the specific affected platform (SGI IRIX 6.3), this issue primarily concerns legacy systems still in operation.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to information disclosure risks. Organizations running legacy SGI IRIX 6.3 systems with the default MachineInfo CGI program enabled could unintentionally expose sensitive system information to remote attackers. This exposure can facilitate targeted attacks by revealing system configurations, installed software versions, and hardware details, which can be leveraged to identify further vulnerabilities or weaknesses. While the direct impact on confidentiality is moderate, the vulnerability does not affect system integrity or availability. The risk is higher for organizations in sectors where legacy SGI systems remain in use, such as certain research institutions, industrial environments, or specialized computing centers. The lack of patches means organizations must rely on compensating controls to mitigate the risk. Overall, the threat is limited in scope but should not be ignored in environments where these systems are still operational.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should implement specific mitigations to reduce exposure. First, disable or restrict access to the MachineInfo CGI program on affected SGI IRIX 6.3 web servers, either by removing the CGI script or configuring the web server to block requests to it. Second, implement network-level access controls such as firewalls or IP whitelisting to limit access to the affected servers only to trusted internal networks or administrators. Third, monitor web server logs for any access attempts to the MachineInfo CGI endpoint to detect potential reconnaissance activity. Fourth, consider isolating legacy SGI IRIX systems from the internet or untrusted networks to minimize exposure. Finally, if possible, plan for migration away from unsupported legacy systems to reduce long-term risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de6ab

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:57:36 PM

Last updated: 7/28/2025, 5:47:21 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats