Skip to main content

CVE-1999-1485: nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attack

Medium
VulnerabilityCVE-1999-1485cve-1999-1485denial of service
Published: Mon May 31 1999 (05/31/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attackers to view files and cause a possible denial of service by mounting the nsd virtual file system.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:26:00 UTC

Technical Analysis

CVE-1999-1485 is a medium-severity vulnerability affecting the Network Services Daemon (nsd) in Silicon Graphics IRIX operating system versions 6.5 through 6.5.2. The nsd service exports a virtual filesystem accessible via a UDP port. Due to improper access controls, remote attackers can mount this virtual filesystem without authentication, allowing them to view files remotely. Additionally, this exposure can be leveraged to cause a denial of service (DoS) by overwhelming the system or disrupting normal filesystem operations. The vulnerability arises because the nsd daemon does not properly restrict access to the exported virtual filesystem, making it accessible over the network without requiring credentials. The CVSS score of 6.4 reflects the network attack vector, low attack complexity, no authentication required, partial confidentiality impact (file viewing), and partial availability impact (DoS). There is no known patch available, and no known exploits have been reported in the wild. The vulnerability is specific to legacy IRIX systems, which were primarily used in specialized high-performance computing and graphics workstations in the late 1990s and early 2000s.

Potential Impact

For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of IRIX systems in modern IT environments. However, organizations that maintain legacy systems for specialized industrial, scientific, or media production purposes could be at risk. An attacker exploiting this vulnerability could gain unauthorized read access to sensitive files on the affected systems, potentially leading to information disclosure. Furthermore, the ability to cause a denial of service could disrupt critical operations relying on these legacy systems, impacting availability. Given the network-based attack vector and lack of authentication, exploitation could be performed remotely, increasing risk if such systems are exposed to untrusted networks. The absence of patches means organizations must rely on compensating controls. While the threat is not widespread, any remaining IRIX 6.5.x deployments in European research institutions, media companies, or industrial environments could face operational and confidentiality risks if exposed.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should implement the following specific mitigations: 1) Isolate IRIX 6.5.x systems running nsd behind strict network segmentation and firewalls to block UDP traffic to the nsd port from untrusted networks. 2) Disable the nsd service if it is not required for operational purposes to eliminate the attack surface. 3) If nsd must remain active, restrict access to trusted IP addresses only using firewall rules or access control lists. 4) Monitor network traffic for unusual UDP activity targeting the nsd service port to detect potential exploitation attempts. 5) Consider migrating critical workloads off IRIX 6.5.x systems to supported platforms to eliminate legacy vulnerabilities. 6) Conduct regular audits of legacy systems to identify and document any exposed services. 7) Employ intrusion detection/prevention systems tuned to detect anomalous access patterns to the nsd service. These targeted controls go beyond generic advice by focusing on network isolation, service disablement, and monitoring specific to the nsd vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df040

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 5:26:00 PM

Last updated: 8/10/2025, 3:52:58 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats