Skip to main content

CVE-1999-1120: netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executin

Medium
VulnerabilityCVE-1999-1120cve-1999-1120
Published: Sat Jan 04 1997 (01/04/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:12:27 UTC

Technical Analysis

CVE-1999-1120 is a vulnerability found in the netprint utility of SGI IRIX operating system versions 5.3 through 6.4 and earlier. The issue arises because netprint trusts the PATH environment variable when locating and executing the 'disable' program. This trust allows a local user to manipulate the PATH variable to point to a malicious executable named 'disable' placed in a directory they control. When netprint runs, it inadvertently executes this malicious program with elevated privileges, enabling the attacker to gain unauthorized privilege escalation on the system. The vulnerability is local, requiring the attacker to have access to the system to exploit it. The CVSS v2 score is 4.6 (medium severity), reflecting the limited attack vector (local), low complexity, no authentication required, and partial impact on confidentiality, integrity, and availability. Patches are available from SGI via FTP links provided in the advisory, addressing this issue by correcting how netprint locates the disable program, likely by using absolute paths or sanitizing the environment variables before execution.

Potential Impact

For European organizations that still operate legacy SGI IRIX systems, this vulnerability poses a risk of local privilege escalation. An attacker with local access—such as a disgruntled employee, contractor, or someone who gains physical or remote shell access—could exploit this flaw to elevate their privileges, potentially gaining root access. This could lead to unauthorized system modifications, data breaches, or disruption of printing services critical to business operations. Although the vulnerability is relatively old and affects legacy systems, some industrial, research, or specialized environments in Europe might still rely on IRIX systems. The impact is thus limited to organizations with such legacy infrastructure. However, the compromise of such systems could serve as a foothold for lateral movement within a network, especially in environments where IRIX systems interface with other critical infrastructure.

Mitigation Recommendations

European organizations should first identify any SGI IRIX systems in their environment, particularly versions 5.3 through 6.4 and earlier. For affected systems, immediate application of the official patches provided by SGI is recommended to remediate the vulnerability. If patching is not feasible due to operational constraints, organizations should restrict local access to these systems strictly, ensuring only trusted personnel have login capabilities. Additionally, system administrators can mitigate risk by sanitizing environment variables, especially PATH, before running netprint or by modifying netprint to use absolute paths for executing the disable program. Monitoring and auditing local user activities on these systems can help detect any attempts to exploit this vulnerability. Finally, organizations should consider migrating away from legacy IRIX systems to supported platforms to reduce exposure to such outdated vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de610

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:12:27 AM

Last updated: 7/27/2025, 8:50:30 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats