Sgi Sgi

Do you want an email whenever new security vulnerabilities are reported in any Sgi product?

Products by Sgi Sorted by Most Security Vulnerabilities since 2018

Sgi Irix23 vulnerabilities

Sgi Propack8 vulnerabilities

Sgi Freeware1 vulnerability

Sgi License Oeo1 vulnerability

By the Year

In 2024 there have been 0 vulnerabilities in Sgi . Sgi did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Sgi vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Sgi Security Vulnerabilities

Ethereal 0.9.0 through 0.10.7

CVE-2004-1142 - December 15, 2004

Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.

Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7

CVE-2004-1139 - December 15, 2004

Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).

Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3

CVE-2004-0507 - August 18, 2004

Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.

The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors

CVE-2004-0506 - August 18, 2004

The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.

The AIM dissector in Ethereal 0.10.3

CVE-2004-0505 - August 18, 2004

The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.

Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash)

CVE-2004-0504 - August 18, 2004

Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31

CVE-2004-0492 - August 06, 2004

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may

CVE-2004-0488 - July 07, 2004

Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.

Memory Corruption

The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could

CVE-2003-0174 9.8 - Critical - May 12, 2003

The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password.

Origin Validation Error

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems

CVE-2001-0554 - August 14, 2001

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

Classic Buffer Overflow

Heap overflow in FTP daemon in Solaris 8

CVE-2001-0249 9.8 - Critical - June 18, 2001

Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.

Incorrect Calculation of Buffer Size

Buffer overflow in FTP server in HPUX 11

CVE-2001-0248 9.8 - Critical - June 18, 2001

Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.

Incorrect Calculation of Buffer Size

Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind

CVE-1999-0461 - January 28, 1999

Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.

ICMP information such as (1) netmask and (2) timestamp is

CVE-1999-0524 - August 01, 1997

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

Information Disclosure

root privileges via buffer overflow in xlock command on SGI IRIX systems.

CVE-1999-0030 - July 16, 1997

root privileges via buffer overflow in xlock command on SGI IRIX systems.

root privileges via buffer overflow in pset command on SGI IRIX systems.

CVE-1999-0026 - July 16, 1997

root privileges via buffer overflow in pset command on SGI IRIX systems.

root privileges via buffer overflow in eject command on SGI IRIX systems.

CVE-1999-0027 - July 16, 1997

root privileges via buffer overflow in eject command on SGI IRIX systems.

Buffer Overflow

root privileges via buffer overflow in login/scheme command on SGI IRIX systems.

CVE-1999-0028 - July 16, 1997

root privileges via buffer overflow in login/scheme command on SGI IRIX systems.

root privileges via buffer overflow in ordist command on SGI IRIX systems.

CVE-1999-0029 - July 16, 1997

root privileges via buffer overflow in ordist command on SGI IRIX systems.

Denial of service in RPC portmapper

CVE-1999-0195 - July 01, 1997

Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.