CVE-1999-0245

MEDIUM4.6/ 10.0
Share:
Published: September 7, 1995 at 04:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".

CVSS Metrics

Base Score
4.6
Severity
MEDIUM
Vector String
AV:L/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Critical vulnerability in certain Linux NIS+ configurations allowed unauthorized users to gain root-level access by logging in as the wildcard user '+'. This flaw bypassed authentication, granting attackers complete control over the compromised system and potentially leading to widespread data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: Configuration Check: The attacker identifies a Linux system running NIS+ and attempts to determine if the system is configured to allow the '+' user. Step 2: Login Attempt: The attacker attempts to log in to the system using the username '+'. Step 3: Authentication Bypass: Due to the vulnerability, the NIS+ authentication process fails to properly validate the user's identity when the wildcard entry is present. Step 4: Privilege Escalation: The attacker is granted access with the privileges associated with the wildcard user, which, in many configurations, is root. Step 5: System Compromise: The attacker now has full control of the system and can execute arbitrary commands, install malware, and steal data.

03 // Deep Technical Analysis

The vulnerability stems from a flaw in how NIS+ handled the wildcard user entry ('+') in its authentication process. Specifically, the NIS+ daemon, when configured with certain settings, failed to properly validate the user's identity when the wildcard entry was present. This allowed an attacker to bypass authentication checks and gain access with the privileges associated with the wildcard user, which, in many configurations, defaulted to root. The root cause is a logic error in the authentication code, likely related to how the '+' entry was prioritized or handled during the login sequence. This is not a buffer overflow or race condition but a logic flaw in the authentication flow.

CVE-1999-0245 - MEDIUM Severity (4.6) | Free CVE Database | 4nuxd