CVE-1999-0044

HIGH7.2/ 10.0
Share:
Published: December 3, 1996 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Local privilege escalation is possible on vulnerable IRIX systems due to a flaw in the fsdump command, allowing attackers to gain root access by manipulating sensitive files. This vulnerability enables attackers to completely compromise the system, potentially leading to data breaches and system outages.

02 // Vulnerability Mechanism

Step 1: Identify Vulnerable System: The attacker identifies a system running a vulnerable version of IRIX and confirms the presence of the fsdump command.

Step 2: File Manipulation: The attacker crafts a malicious file or symbolic link, targeting a critical system file (e.g., /etc/passwd, /etc/shadow) or a file that fsdump will interact with.

Step 3: Trigger fsdump: The attacker executes the fsdump command, potentially providing crafted input to trigger the vulnerability. This could involve specifying the malicious file or symbolic link in a way that fsdump processes it.

Step 4: File Overwrite/Modification: fsdump, due to its flawed logic, either overwrites the targeted system file with the attacker's malicious content or modifies it in a way that grants the attacker root privileges (e.g., adding a new user with root privileges or modifying an existing user's privileges).

Step 5: Privilege Escalation: The attacker leverages the modified system file (e.g., by logging in with the newly created root user) to gain root access.

03 // Deep Technical Analysis

The vulnerability lies within the fsdump command's handling of file system metadata and permissions. Specifically, the command likely fails to properly validate or sanitize user-supplied input or file paths when restoring file system data. This could lead to a symlink attack or similar technique where an attacker can replace critical system files with malicious versions, or overwrite sensitive data. The root cause is a lack of proper input validation and insufficient permission checks, allowing a local user to manipulate the file system in a way that leads to privilege escalation.

CVE-1999-0044 - HIGH Severity (7.2) | Free CVE Database | 4nuxd