CVE-1999-1392

HIGH7.2/ 10.0
Share:
Published: October 3, 1990 at 04:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges.

CVSS Metrics

Base Score
7.2
Severity
HIGH
Vector String
AV:L/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Critical vulnerability in the NeXTSTEP operating system allows local users to escalate privileges to root. Exploiting the restore0.9 installation script grants attackers complete control over the system, potentially leading to data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: User Interaction: A local user initiates the restore0.9 script, likely during a system restore or software installation.

Step 2: Input Manipulation: The user provides crafted input, potentially through a configuration file or command-line arguments, designed to exploit the vulnerability.

Step 3: Script Execution: The restore0.9 script processes the user-supplied input.

Step 4: Command Injection: The crafted input is interpreted as a command, leading to the execution of arbitrary code with root privileges.

Step 5: Privilege Escalation: The attacker's code gains root access, enabling them to modify system files, install backdoors, and compromise the system.

03 // Deep Technical Analysis

The vulnerability stems from a flaw in the restore0.9 installation script within NeXTSTEP 1.0a and 1.0. The script likely mishandles user-supplied input, potentially allowing for the injection of malicious commands during the restoration process. This could involve a command injection vulnerability, where crafted input is interpreted as commands executed with root privileges. The script's lack of proper input validation or sanitization is the root cause, leading to the execution of arbitrary code under the context of the root user.

CVE-1999-1392 - HIGH Severity (7.2) | Free CVE Database | 4nuxd