Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1401: Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for

0
Medium
VulnerabilityCVE-1999-1401cve-1999-1401
Published: Thu Dec 05 1996 (12/05/1996, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook).

AI-Powered Analysis

AILast updated: 07/02/2025, 00:39:53 UTC

Technical Analysis

CVE-1999-1401 is a medium-severity vulnerability affecting the Desktop searchbook program in Silicon Graphics IRIX operating system versions 5.0.x through 6.2. The vulnerability arises from insecure file permission settings applied to certain user files, specifically 'iconbook' and 'searchbook' files. These files are used by the Desktop searchbook program to store user-specific data related to desktop search functionality. Due to improper permission configurations, unauthorized local users could potentially access or modify these files, leading to partial compromise of confidentiality, integrity, and availability of user data. The vulnerability requires local access (attack vector: local), has low attack complexity, and does not require authentication, but exploitation is limited to users with local system access. The CVSS v2 base score is 4.6, reflecting medium severity with partial impacts on confidentiality, integrity, and availability. Patches addressing this issue were released by SGI in December 1996, and are available via SGI's FTP patch repositories. No known exploits have been reported in the wild, likely due to the age of the affected systems and limited deployment of IRIX today. However, legacy systems still running these IRIX versions remain vulnerable if unpatched. The vulnerability primarily affects the IRIX operating system, which was historically used on SGI workstations and servers, often in specialized technical and scientific environments.

Potential Impact

For European organizations, the impact of this vulnerability is generally low to medium in modern contexts due to the obsolescence of IRIX systems. However, organizations in sectors such as research, engineering, or media that historically used SGI IRIX workstations might still have legacy systems in operation. In such cases, exploitation could lead to unauthorized local users accessing or modifying sensitive user files, potentially leading to data leakage or local privilege escalation scenarios if combined with other vulnerabilities. The partial compromise of confidentiality, integrity, and availability could disrupt critical workflows or expose sensitive project data. Given the requirement for local access, the threat is mainly from insider threats or attackers who have already gained some foothold on the system. The lack of known exploits reduces immediate risk, but unpatched legacy systems remain a potential target for attackers seeking to leverage overlooked vulnerabilities in specialized environments.

Mitigation Recommendations

Organizations should first identify any remaining IRIX 5.0.x through 6.2 systems in their environment, particularly those running the Desktop searchbook program. Applying the official patches provided by SGI (available via the provided FTP links) is the primary mitigation step. If patching is not feasible due to system constraints, organizations should restrict local access to these systems to trusted personnel only, enforce strict access controls, and monitor for unusual local activity. Additionally, migrating legacy workloads to modern, supported platforms should be prioritized to eliminate exposure to this and other legacy vulnerabilities. Implementing host-based intrusion detection systems (HIDS) on IRIX systems can help detect unauthorized file access or modifications. Regular audits of file permissions for user files related to the Desktop searchbook program can also help identify insecure configurations. Finally, educating users and administrators about the risks of legacy systems and the importance of patching or decommissioning them is critical.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de56f

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:39:53 AM

Last updated: 2/4/2026, 1:27:23 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats