COMMAND

    sysmonpp

SYSTEMS AFFECTED

    IRIX 5.0.X, 5.1.X, 5.2, 5.3, 6.0.X, 6.1, 6.2

PROBLEM

    The  security  vulnerability  found  within  this  set of programs
    could allow an  unprivileged user to  execute any existing  binary
    as other UIDs including possibly root.

    It should  be noted  that exploit  is very  obscure and difficult.
    Additionally, a local account  and physical access to  the console
    is required in order to exploit this vulnerability.

SOLUTION

    Get patch if available  or simply edit the  file /etc/syslog.conf.
    Place  a  "#"  as  the  first  character  of  the sysmonpp line to
    comment out and deactivate the service.