2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
15.6%
A vulnerability in the SGI IRIX PIOCSWATCH ioctl() function may allow local attackers to crash the operating system.
SGI states that PIOCSWATCH ioctl “establishes or clears a set of watched areas in the traced process.” According to SGI Security Advisory 20030603-01-P, a local attacker could crash the operating system by exploiting this vulnerability:
It's been reported that non-root users can call the PIOCSWATCH ioctl() in its various invocations via a user space program and crash IRIX with a kernel panic. This could be used as a potential Denial of Service attack on the system. A local account on the system is required.
A local attacker may be able to crash the operating system.
The vendor encourages users to either upgrade to IRIX 6.5.21 (when it becomes available) or apply a patch as described in SGI Security Advisory 20030603-01-P.
142228
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: June 11, 2003
Affected
See <ftp://patches.sgi.com/support/free/security/advisories/20030603-01-P>.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23142228 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to SGI for reporting this vulnerability.
This document was written by Ian A Finlay, and is based on information contained within the SGI Security Advisory 20030603-01-P.
CVE IDs: | CVE-2003-0175 |
---|---|
Severity Metric: | 2.16 Date Public: |