Vulnerability in SGI IRIX 6.5.11 through 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Irix | Sgi | 6.5 (including) | 6.5 (including) |
Irix | Sgi | 6.5.1 (including) | 6.5.1 (including) |
Irix | Sgi | 6.5.2 (including) | 6.5.2 (including) |
Irix | Sgi | 6.5.3 (including) | 6.5.3 (including) |
Irix | Sgi | 6.5.4 (including) | 6.5.4 (including) |
Irix | Sgi | 6.5.5 (including) | 6.5.5 (including) |
Irix | Sgi | 6.5.6 (including) | 6.5.6 (including) |
Irix | Sgi | 6.5.7 (including) | 6.5.7 (including) |
Irix | Sgi | 6.5.8 (including) | 6.5.8 (including) |
Irix | Sgi | 6.5.9 (including) | 6.5.9 (including) |
Irix | Sgi | 6.5.10 (including) | 6.5.10 (including) |
Irix | Sgi | 6.5.11f (including) | 6.5.11f (including) |
Irix | Sgi | 6.5.11m (including) | 6.5.11m (including) |
Irix | Sgi | 6.5.12f (including) | 6.5.12f (including) |
Irix | Sgi | 6.5.12m (including) | 6.5.12m (including) |
Irix | Sgi | 6.5.13f (including) | 6.5.13f (including) |
Irix | Sgi | 6.5.13m (including) | 6.5.13m (including) |
Irix | Sgi | 6.5.14f (including) | 6.5.14f (including) |
Irix | Sgi | 6.5.14m (including) | 6.5.14m (including) |
Irix | Sgi | 6.5.15f (including) | 6.5.15f (including) |
Irix | Sgi | 6.5.15m (including) | 6.5.15m (including) |