COMMAND
sysmonpp
SYSTEMS AFFECTED
IRIX 5.0.X, 5.1.X, 5.2, 5.3, 6.0.X, 6.1, 6.2
PROBLEM
The security vulnerability found within this set of programs
could allow an unprivileged user to execute any existing binary
as other UIDs including possibly root.
It should be noted that exploit is very obscure and difficult.
Additionally, a local account and physical access to the console
is required in order to exploit this vulnerability.
SOLUTION
Get patch if available or simply edit the file /etc/syslog.conf.
Place a "#" as the first character of the sysmonpp line to
comment out and deactivate the service.