Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x up to and including 6.5.21f, and possibly earlier versions, allows malicious users to gain root privileges via the AUTH_UNIX gid list.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sgi irix 6.5 |
||
sgi irix 6.5.1 |
||
sgi irix 6.5.16 |
||
sgi irix 6.5.17 |
||
sgi irix 6.5.19f |
||
sgi irix 6.5.19m |
||
sgi irix 6.5.3 |
||
sgi irix 6.5.4 |
||
sgi irix 6.5.14 |
||
sgi irix 6.5.15 |
||
sgi irix 6.5.18m |
||
sgi irix 6.5.19 |
||
sgi irix 6.5.21 |
||
sgi irix 6.5.21f |
||
sgi irix 6.5.21m |
||
sgi irix 6.5.9 |
||
sgi irix 6.5.10 |
||
sgi irix 6.5.11 |
||
sgi irix 6.5.17f |
||
sgi irix 6.5.17m |
||
sgi irix 6.5.2 |
||
sgi irix 6.5.20 |
||
sgi irix 6.5.5 |
||
sgi irix 6.5.6 |
||
sgi irix 6.5.12 |
||
sgi irix 6.5.13 |
||
sgi irix 6.5.18 |
||
sgi irix 6.5.18f |
||
sgi irix 6.5.20f |
||
sgi irix 6.5.20m |
||
sgi irix 6.5.7 |
||
sgi irix 6.5.8 |