SGI Information for VU#10277
Various shells create temporary files insecurely when using << operator
The vendor has not provided us with any further information regarding this vulnerability.
Previous statement (May 18, 2001):
SGI acknowledges receiving the vulnerability reported and is currently
investigating. No further information is available at this time.
As further information becomes available, additional advisories will be
issued via the normal SGI security informationdistribution methods
including the wiretap mailing list and http://www.sgi.com/support/security/
For the protection of all our customers, SGI does not disclose, discuss or
confirm vulnerabilities until a full investigation has occurred and any
necessary patch(es) or release streams are available for all vulnerable
and supported IRIX operating systems.
Until SGI has more definitive information to provide, customers are
encouraged to assume all security vulnerabilities as exploitable and take
appropriate steps according to local site security policies and requirements.
If you have feedback, comments, or additional information about this vulnerability, please send us email.