CVE-1999-0084

HIGH8.4/ 10.0
Share:
Published: May 1, 1990 at 04:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0.

CVSS Metrics

Base Score
8.4
Severity
HIGH
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

NFS servers are vulnerable to a critical privilege escalation flaw allowing attackers to gain root access by exploiting the mknod command. This vulnerability enables attackers to create a malicious device file, granting them unauthorized control over the system's kernel memory and, ultimately, the entire server. Successful exploitation leads to complete system compromise.

02 // Vulnerability Mechanism

Step 1: NFS Mount: The attacker mounts the vulnerable NFS share from the target server.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and access control within certain NFS server implementations. Specifically, the mknod system call, when used by an NFS client, fails to adequately restrict the creation of special device files, particularly those related to kernel memory (kmem). The NFS server, trusting the client's request, allows the creation of a writable kmem device. By setting the User ID (UID) to 0 (root) during the mknod operation, an attacker can then write to this device, effectively manipulating kernel memory. This manipulation can be used to overwrite critical kernel data structures, such as the uid of the current process, granting the attacker root privileges. The root cause is the absence of proper checks on the type and ownership of the device being created, as well as the lack of authorization for the NFS client to perform these privileged operations. This is a classic example of a privilege escalation vulnerability due to insufficient access control and input validation.

CVE-1999-0084 - HIGH Severity (8.4) | Free CVE Database | 4nuxd