CVE-1999-1276

HIGH7.2/ 10.0
Share:
Published: December 7, 1998 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Local privilege escalation is possible due to a flaw in the fte-console package, allowing attackers to gain root access on vulnerable systems. This vulnerability stems from the failure of the application to relinquish elevated privileges after initialization, creating a window for malicious code execution. Successful exploitation grants complete control over the compromised system.

02 // Vulnerability Mechanism

Step 1: Vulnerability Trigger: The fte-console application is running on the system, likely as part of the system's boot process or as a service. It is running with root privileges.

Step 2: Accessing the Virtual Console: The attacker interacts with the virtual console device, which is managed by fte-console. This interaction could involve sending specific commands or data to the device.

Step 3: Command Injection: The attacker crafts a malicious command or payload designed to be executed with root privileges. This payload is injected through the virtual console device.

Step 4: Privilege Escalation: Because fte-console is running with root privileges and hasn't dropped them, the injected command is executed with root privileges.

Step 5: System Compromise: The attacker's malicious command executes, granting them root access and complete control over the system.

03 // Deep Technical Analysis

The vulnerability lies in the fte-console application's failure to drop root privileges after its initial setup. Specifically, the application, when started, likely runs with elevated privileges (root) to perform certain initialization tasks. However, it does not subsequently relinquish these privileges. This means that any subsequent actions performed by fte-console are still executed with root privileges. An attacker can leverage this by injecting malicious code or commands through the virtual console device. The root cause is a missing or improperly implemented setuid() or setgid() call to lower the application's privileges after the initial setup phase. This allows an attacker to execute arbitrary commands with root privileges.

CVE-1999-1276 - HIGH Severity (7.2) | Free CVE Database | 4nuxd