Lucene search

K
certCERTVU:142228
HistoryJun 11, 2003 - 12:00 a.m.

SGI IRIX vulnerable to DoS when user space program calls the PIOCSWATCH ioctl() function

2003-06-1100:00:00
www.kb.cert.org
17

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

15.6%

Overview

A vulnerability in the SGI IRIX PIOCSWATCH ioctl() function may allow local attackers to crash the operating system.

Description

SGI states that PIOCSWATCH ioctl “establishes or clears a set of watched areas in the traced process.” According to SGI Security Advisory 20030603-01-P, a local attacker could crash the operating system by exploiting this vulnerability:

It's been reported that non-root users can call the PIOCSWATCH ioctl() in its various invocations via a user space program and crash IRIX with a kernel panic. This could be used as a potential Denial of Service attack on the system. A local account on the system is required.


Impact

A local attacker may be able to crash the operating system.


Solution

The vendor encourages users to either upgrade to IRIX 6.5.21 (when it becomes available) or apply a patch as described in SGI Security Advisory 20030603-01-P.


Vendor Information

142228

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

SGI __ Affected

Updated: June 11, 2003

Status

Affected

Vendor Statement

See <ftp://patches.sgi.com/support/free/security/advisories/20030603-01-P&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23142228 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to SGI for reporting this vulnerability.

This document was written by Ian A Finlay, and is based on information contained within the SGI Security Advisory 20030603-01-P.

Other Information

CVE IDs: CVE-2003-0175
Severity Metric: 2.16 Date Public:

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

15.6%

Related for VU:142228