{"vuid":"VU#142228","idnumber":"142228","name":"SGI IRIX vulnerable to DoS when user space program calls the PIOCSWATCH ioctl() function","keywords":["SGI IRIX","DoS","denial of service","user space program","PIOCSWATCH","ioctl() function"],"overview":"A vulnerability in the SGI IRIX PIOCSWATCH ioctl() function may allow local attackers to crash the operating system.","clean_desc":"SGI states that PIOCSWATCH ioctl \"establishes or clears a set of watched areas in the traced process.\" According to SGI Security Advisory 20030603-01-P, a local attacker could crash the operating system by exploiting this vulnerability: It's been reported that non-root users can call the PIOCSWATCH ioctl() in its various invocations via a user space program and crash IRIX with a kernel panic. This could be used as a potential Denial of Service attack on the system. A local account on the system is required.","impact":"A local attacker may be able to crash the operating system.","resolution":"The vendor encourages users to either upgrade to IRIX 6.5.21 (when it becomes available) or apply a patch as described in SGI Security Advisory 20030603-01-P.","workarounds":"","sysaffected":"","thanks":"Thanks to SGI for reporting this vulnerability.","author":"This document was written by Ian A Finlay, and is based on information contained within the SGI Security Advisory 20030603-01-P.","public":["http://www.secunia.com/advisories/8996/","ftp://patches.sgi.com/support/free/security/advisories/20030603-01-P","http://techpubs.sgi.com/library/tpl/cgi-bin/getdoc.cgi?coll=0650&db=man&fname=/usr/share/catman/p_man/cat4/proc.z&srch=PIOCSWATCH"],"cveids":["CVE-2003-0175"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-06-11T13:25:52Z","publicdate":"2003-06-10T00:00:00Z","datefirstpublished":"2003-06-11T17:14:23Z","dateupdated":"2003-06-11T17:47:46Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"8","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.16","cam_scorecurrentwidelyknown":"2.76","cam_scorecurrentwidelyknownexploited":"5.16","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.16,"vulnote":null}