Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0033: Command execution in Sun systems via buffer overflow in the at program.

0
High
VulnerabilityCVE-1999-0033cve-1999-0033buffer overflow
Published: Thu Jun 12 1997 (06/12/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: ncr
Product: mp-ras

Description

Command execution in Sun systems via buffer overflow in the at program.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:40:31 UTC

Technical Analysis

CVE-1999-0033 is a high-severity buffer overflow vulnerability affecting the 'at' program on Sun systems, specifically within the NCR MP-RAS product versions 2.1, 3.0, 3.2v4, 5.0, 5.3, 5.4, 5.5, and 5.5.1. The 'at' program is a Unix utility used to schedule commands to be executed at a later time. The vulnerability arises from improper bounds checking in the handling of input data, allowing an attacker with local access to overflow a buffer and execute arbitrary commands with the privileges of the 'at' program. The CVSS v2 score of 7.2 reflects a high severity, with the attack vector being local (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and full confidentiality, integrity, and availability impact (C:C/I:C/A:C). Exploitation requires local access, but no authentication, meaning any local user or process can potentially exploit this flaw to escalate privileges or execute arbitrary code. Despite the age of this vulnerability (published in 1997), no patches are available, and no known exploits are reported in the wild. The affected product, NCR MP-RAS, is a Unix-based operating system variant used primarily in certain enterprise environments, particularly on Sun hardware platforms. This vulnerability represents a critical risk in legacy systems that remain operational without mitigation, as it can lead to full system compromise through local command execution.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of legacy Sun systems running the affected NCR MP-RAS versions. Organizations in sectors such as telecommunications, finance, or government that historically deployed Sun hardware and the MP-RAS OS may still have these systems in operation, especially in industrial control or specialized environments. Exploitation could allow an attacker with local access to gain unauthorized command execution, potentially leading to full system compromise, data theft, or disruption of critical services. Given the full confidentiality, integrity, and availability impact, this vulnerability could facilitate insider threats or lateral movement within a network. The lack of available patches increases risk, as organizations must rely on compensating controls. While the vulnerability requires local access, compromised or malicious insiders, or attackers who gain initial footholds through other means, could leverage this flaw to escalate privileges and deepen their access. This could be particularly damaging in environments with weak internal segmentation or insufficient monitoring.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should focus on compensating controls and risk reduction strategies. These include: 1) Identifying and inventorying all systems running NCR MP-RAS and the affected 'at' program versions to assess exposure. 2) Restricting local access strictly to trusted administrators and users, employing strong access control policies and multi-factor authentication where possible. 3) Disabling or removing the 'at' program if it is not essential to operations, or replacing it with safer scheduling alternatives. 4) Implementing strict monitoring and logging of local command execution and scheduling activities to detect anomalous behavior. 5) Employing host-based intrusion detection systems (HIDS) to identify exploitation attempts or unusual buffer overflow indicators. 6) Network segmentation to isolate legacy systems from general user networks, limiting attack surface. 7) Considering migration or upgrade plans to modern, supported operating systems to eliminate exposure to this and other legacy vulnerabilities. 8) Conducting regular security audits and penetration tests focused on legacy system vulnerabilities and local privilege escalation risks.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de702

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 7:40:31 AM

Last updated: 2/7/2026, 11:15:05 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats