CVE-1999-1468
Cray Next — NVD-CWE-Other
- Published: 1991-10-22T04:00:00.000
- Last modified: 2025-04-03T01:03:51.193
- Vendors: Cray, Next
- Products: Next, Unico
- CWE: NVD-CWE-Other
CVE-1999-1468 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. [Weakness: NVD-CWE-Other]
Related CVE by CWE
No related CWE found.
Top CVE for Vendor
No items for this vendor.
Recently Exploited Similar Vulnerabilities
No recent KEV-listed items for this vendor/product.
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
🧠 Explainer: What this vulnerability means
Summary: The issue in Next by Cray (CWE: unspecified) may enable attacks.
Impact: Systems could be compromised, leading to confidentiality, integrity, or availability loss.
Mitigation: Until patched, restrict exposure, enforce least privilege, and monitor for suspicious activity.
- http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html []
- http://www.cert.org/advisories/CA-91.20.rdist.vulnerability [Patch, Third Party Advisory, US Government Resource]
- http://www.iss.net/security_center/static/7160.php []
- http://www.osvdb.org/8106 []
- http://www.securityfocus.com/bid/31 [Patch, Vendor Advisory]
- http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html []
- http://www.cert.org/advisories/CA-91.20.rdist.vulnerability [Patch, Third Party Advisory, US Government Resource]
- http://www.iss.net/security_center/static/7160.php []
- http://www.osvdb.org/8106 []
- http://www.securityfocus.com/bid/31 [Patch, Vendor Advisory]