Vulnerabilities > CVE-2000-1193 - Unspecified vulnerability in SGI Irix 6.3/6.4/6.5

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
sgi
nessus
exploit available

Summary

Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port.

Vulnerable Configurations

Part Description Count
OS
Sgi
3

Exploit-Db

descriptionIRIX 6.5.x Performance Co-Pilot Remote Denial of Service Vulnerability. CVE-2000-1193. Dos exploit for irix platform
idEDB-ID:21431
last seen2016-02-02
modified2002-04-12
published2002-04-12
reporterMarcelo Magnasco
sourcehttps://www.exploit-db.com/download/21431/
titleIRIX 6.5.x Performance Co-Pilot Remote Denial of Service Vulnerability

Nessus

NASL familyMisc.
NASL idIRIX_COPILOT.NASL
descriptionThe service
last seen2020-06-01
modified2020-06-02
plugin id11369
published2003-03-13
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11369
titleIrix Performance Copilot Service Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(11369);
 script_version ("1.19");
 script_cve_id("CVE-2000-0283", "CVE-2000-1193");
 script_bugtraq_id(1106, 4642);
 
 script_name(english:"Irix Performance Copilot Service Information Disclosure");

 script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The service 'IRIX performance copilot' is running.

This service discloses sensitive information about the remote host,
and may be used by an attacker to perform a local denial of service.

*** This warning may be a false positive since the presence
*** of the bug was not verified locally." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Apr/45" );
 script_set_attribute(attribute:"solution", value:
"Restrict access through the pmcd.conf file." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/03/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/12");
 script_cvs_date("Date: 2018/11/15 20:50:23");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks the presence of IRIX copilot");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"Misc."); 

 script_require_ports(4321);
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");

port = 4321;

if(get_port_state(port))
{
 soc = open_sock_tcp(port);
 if(!soc)exit(0);
 r = recv(socket:soc, length:20);
 m = raw_string(0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x70, 0x00, 0x00, 0x00);
 if(m >< r) {
 	register_service(port:port, proto:"copilot");
 	security_warning(port);
	}
}