Skip to main content

CVE-1999-1461: inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find a

High
VulnerabilityCVE-1999-1461cve-1999-1461
Published: Wed May 07 1997 (05/07/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program.

AI-Powered Analysis

AILast updated: 07/01/2025, 10:28:06 UTC

Technical Analysis

CVE-1999-1461 is a local privilege escalation vulnerability found in the inpview utility of the InPerson software running on Silicon Graphics IRIX operating systems versions 5.3 through 6.5.10. The vulnerability arises because inpview trusts the PATH environment variable to locate and execute the ttsession program without validating the path. An attacker with local access can manipulate the PATH variable to point to a malicious, Trojan horse version of ttsession. When inpview executes this malicious program, it runs with elevated privileges, allowing the attacker to gain root-level access on the affected system. This type of vulnerability is a classic example of a PATH environment variable trust issue leading to privilege escalation. The CVSS v2 score is 7.2 (high severity), reflecting the significant impact on confidentiality, integrity, and availability, combined with low attack complexity and no authentication required. Although this vulnerability is relatively old and specific to IRIX systems, it remains critical for any legacy systems still in operation. A patch is available from SGI, addressing the issue by correcting the way inpview locates and executes ttsession, likely by using absolute paths or sanitizing the environment before execution. No known exploits have been reported in the wild, but the vulnerability's nature makes it a serious risk if local access is obtained.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether they operate legacy SGI IRIX systems, which are uncommon in modern environments but may still exist in specialized industrial, research, or media production contexts. If exploited, an attacker with local access could gain full root privileges, leading to complete system compromise. This could result in unauthorized access to sensitive data, disruption of critical services, and the potential for further lateral movement within the network. Given the high integrity and availability impact, critical infrastructure or research institutions relying on IRIX systems could face operational downtime or data breaches. The lack of required authentication means any local user, including low-privileged insiders or attackers who have gained limited access, could exploit this vulnerability. While the threat is less relevant to most contemporary European enterprises, organizations with legacy systems must consider the risk seriously.

Mitigation Recommendations

Organizations should first identify any IRIX systems running versions 5.3 through 6.5.10. For affected systems, immediate application of the official patches provided by SGI is essential; these patches address the PATH trust issue by ensuring inpview executes ttsession securely. If patching is not immediately feasible, administrators should restrict local user access to trusted personnel only and consider disabling or removing the inpview utility if it is not required. Additionally, system administrators can implement environment sanitization measures, such as clearing or setting a secure PATH variable before running inpview, to reduce risk. Monitoring local user activities and auditing execution of sensitive binaries can help detect exploitation attempts. Given the age of the vulnerability, migrating away from IRIX systems to supported platforms should be a strategic goal to eliminate exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de6af

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 10:28:06 AM

Last updated: 8/17/2025, 10:22:22 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats