IRIX Buffer Overflow

HIGH (7.2) No Patch (9194 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.54% chance of exploitation (percentile: 67%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

IRIX is a Unix operating system used primarily on Sun workstations. A buffer overflow in the dmplay component of IRIX 6.2 and 6.3 allows local users to gain root privileges by exploiting a long command line option.

Am I affected?

You're affected if you use Irix version 6.2 or 6.3. Check with: grep "dmplay" /boot/config (Note: This check requires access to the system's configuration files, which may not be accessible in all environments.)

Version info: Not specified in the advisory.

Affected Products

Sun Microsystems / Irix

How to fix

Immediate mitigations:
- Restrict network access to your Irix instance (firewall it from the public internet)
- Audit admin account activity for suspicious access patterns
- Monitor for unauthorized token creation

Contact Sun Microsystems directly for a patched version - there's no public patch link in the advisory.