IRIX Libgl Buffer Overflow

HIGH (7.2) No Patch (9194 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.47% chance of exploitation (percentile: 64%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

IRIX is a Unix operating system used primarily on Sun workstations. The libgl.so library is part of the IRIX graphics stack, providing access to graphics and display functionality. A buffer overflow in this library allows local users to gain root privileges by manipulating the HOME variable in programs like gmemusage and gr_osview.

Am I affected?

You're affected if you use Irix version 5.3 or earlier. Check with: grep "libgl.so" /usr/lib/irix/libc.a

Note: This CVE is specific to Irix, which was a proprietary Unix operating system. If you don't recognize the name, you're probably not affected.

Affected Products

Sun Microsystems / Irix

How to fix

Upgrade to Irix version 5.4 or later.
- Apply the patch from the IRIX Security Advisory (SA 2000-0794) on the Irix website: https://www.sun.com/technology/security-advisories/