CVE-1999-0127

HIGH7.2/ 10.0
Share:
Published: December 19, 1996 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

HP-UX systems are vulnerable to a critical local privilege escalation via flaws in the swinstall and swmodify commands. Successful exploitation allows attackers to overwrite arbitrary files, leading to root access and complete system compromise. This vulnerability poses a significant risk to the confidentiality, integrity, and availability of affected systems.

02 // Vulnerability Mechanism

Step 1: Identify Target System: The attacker identifies an HP-UX system running a vulnerable version of the SD-UX package.

Step 2: Craft Malicious Input: The attacker crafts a malicious input, likely involving a specially crafted software package or a manipulated installation script, to be used with swinstall or swmodify.

Step 3: Trigger Vulnerability: The attacker executes swinstall or swmodify with the crafted input. This input is designed to exploit the vulnerability in the file handling logic.

Step 4: File Overwrite: The attacker's input causes the swinstall or swmodify command to overwrite a critical system file. This could be achieved through symlink manipulation or other file system tricks.

Step 5: Privilege Escalation: The attacker leverages the overwritten file to gain root access. This could involve modifying /etc/shadow to control user passwords or replacing a setuid binary with a malicious version.

03 // Deep Technical Analysis

The vulnerability stems from insecure handling of file permissions and pathnames within the swinstall and swmodify utilities. These commands, part of the SD-UX package, are used for software installation and modification. The root cause is likely a TOCTOU (Time-of-Check to Time-of-Use) race condition or improper input validation. An attacker can manipulate the file system during the execution of these commands, potentially by creating symbolic links or manipulating file permissions, to overwrite critical system files, such as /etc/shadow or setuid binaries. This allows the attacker to gain root privileges.

CVE-1999-0127 - HIGH Severity (7.2) | Free CVE Database | 4nuxd