CVE-1999-1302

HIGH7.2/ 10.0
Share:
Published: November 30, 1994 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-noinfo
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

SCO UNIX 4.2 and earlier systems are vulnerable to a local privilege escalation via a flaw in the pt_chmod utility. This allows attackers to gain root access, potentially compromising the entire system and leading to complete system takeover. Exploitation is relatively straightforward and can be achieved by a local user with limited privileges.

02 // Vulnerability Mechanism

Step 1: Identify Target System: The attacker identifies a vulnerable SCO UNIX system running version 4.2 or earlier.

Step 2: Local Account Access: The attacker gains access to a local user account on the target system, potentially through social engineering, credential reuse, or another vulnerability.

Step 3: Exploit Execution: The attacker executes a crafted exploit that leverages the pt_chmod vulnerability. The specific exploit details are not provided in the CVE, but it likely involves manipulating the utility's behavior to modify file permissions.

Step 4: Permission Manipulation: The exploit, through pt_chmod, modifies the permissions of a critical system file, such as /etc/passwd or a shadow password file, to grant the attacker root access.

Step 5: Root Access Granted: The attacker now has root privileges and can execute arbitrary commands with elevated privileges, compromising the system.

03 // Deep Technical Analysis

The vulnerability lies within the pt_chmod utility, likely due to inadequate input validation or a race condition when handling file permissions. The exact nature of the flaw is unspecified in the CVE description, but it likely involves a mechanism to manipulate the permissions of a critical system file, such as /etc/passwd or a shadow password file, leading to unauthorized access. The lack of proper checks on user-supplied input or the timing of operations within pt_chmod allows a local user to elevate their privileges to root.

CVE-1999-1302 - HIGH Severity (7.2) | Free CVE Database | 4nuxd