A suitable temporary solution may be to disable the fam service. It is executed by inetd. Simply comment out the entry in /etc/inetd.conf, make sure all instances of fam are killed, and restart inetd. On March 1, 2000, SGI released an advisory on this vulnerability. Fix information was contained within it.
IRIX contains a flaw that may allow a malicious attacker to obtain a complete listing of files and directories on vulnerable systems. The issue is triggered when the File Altercation Monitor (fam) daemon is instructed by a program to monitor the root directory. It is possible that the flaw may allow retrieval of all files under the root directory, resulting in a loss of confidentiality.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: disable the fam service by commenting out the entry for it in /etc/inetd.conf, and rebooting.