Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Irix | Sgi | 6.5 (including) | 6.5 (including) |
Irix | Sgi | 6.5.1 (including) | 6.5.1 (including) |
Irix | Sgi | 6.5.2 (including) | 6.5.2 (including) |
Irix | Sgi | 6.5.3 (including) | 6.5.3 (including) |
Irix | Sgi | 6.5.4 (including) | 6.5.4 (including) |
Irix | Sgi | 6.5.5 (including) | 6.5.5 (including) |
Irix | Sgi | 6.5.6 (including) | 6.5.6 (including) |
Irix | Sgi | 6.5.7 (including) | 6.5.7 (including) |
Irix | Sgi | 6.5.8 (including) | 6.5.8 (including) |
Irix | Sgi | 6.5.9 (including) | 6.5.9 (including) |
Irix | Sgi | 6.5.10 (including) | 6.5.10 (including) |
Irix | Sgi | 6.5.11 (including) | 6.5.11 (including) |
Irix | Sgi | 6.5.12 (including) | 6.5.12 (including) |
Irix | Sgi | 6.5.13 (including) | 6.5.13 (including) |
Irix | Sgi | 6.5.14 (including) | 6.5.14 (including) |
Irix | Sgi | 6.5.15 (including) | 6.5.15 (including) |
Irix | Sgi | 6.5.16 (including) | 6.5.16 (including) |
Irix | Sgi | 6.5.17 (including) | 6.5.17 (including) |
Irix | Sgi | 6.5.17f (including) | 6.5.17f (including) |
Irix | Sgi | 6.5.17m (including) | 6.5.17m (including) |
Irix | Sgi | 6.5.18 (including) | 6.5.18 (including) |
Irix | Sgi | 6.5.18f (including) | 6.5.18f (including) |
Irix | Sgi | 6.5.18m (including) | 6.5.18m (including) |
Irix | Sgi | 6.5.19 (including) | 6.5.19 (including) |
Irix | Sgi | 6.5.19f (including) | 6.5.19f (including) |
Irix | Sgi | 6.5.19m (including) | 6.5.19m (including) |
Irix | Sgi | 6.5.20 (including) | 6.5.20 (including) |
Irix | Sgi | 6.5.20f (including) | 6.5.20f (including) |
Irix | Sgi | 6.5.20m (including) | 6.5.20m (including) |
Irix | Sgi | 6.5.21 (including) | 6.5.21 (including) |
Irix | Sgi | 6.5.21f (including) | 6.5.21f (including) |
Irix | Sgi | 6.5.21m (including) | 6.5.21m (including) |