CVE-1999-1318

HIGH7.2/ 10.0
Share:
Published: September 17, 1993 at 04:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Local privilege escalation is possible on vulnerable SunOS systems due to an insecure search path used by the su command. This allows attackers to execute arbitrary code with elevated privileges, potentially leading to complete system compromise and data exfiltration.

02 // Vulnerability Mechanism

Step 1: Preparation: The attacker creates a malicious executable (e.g., a shell script or compiled program) and names it after a command that su might execute (e.g., sh, bash, or a utility used by the target user).

03 // Deep Technical Analysis

The vulnerability stems from the su command's insecure search path, which includes the current working directory (.). When su is invoked, it searches for executables in the current directory before other system paths. This allows an attacker to place a malicious program, named the same as a program su might execute (e.g., sh, bash, or other utilities), in a directory the user controls. When a privileged user then uses su to change to another user, and that user's shell or other commands are invoked, the attacker's malicious program is executed instead of the legitimate one, gaining the privileges of the target user. The root cause is a design flaw where the search path prioritizes the current directory, creating an opportunity for Trojan horse attacks. There is no specific buffer overflow or race condition in this vulnerability, but rather a logical flaw in how the system searches for executables.

CVE-1999-1318 - HIGH Severity (7.2) | Free CVE Database | 4nuxd