Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0057: Vacation program allows command execution by remote users through a sendmail command.

0
High
VulnerabilityCVE-1999-0057cve-1999-0057
Published: Mon Nov 16 1998 (11/16/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: eric_allman
Product: vacation

Description

Vacation program allows command execution by remote users through a sendmail command.

AI-Powered Analysis

AILast updated: 06/29/2025, 12:12:04 UTC

Technical Analysis

CVE-1999-0057 is a high-severity remote code execution vulnerability found in the 'vacation' program, a utility originally developed by Eric Allman. The vacation program is designed to automatically respond to incoming email messages with an out-of-office reply. This vulnerability arises because the vacation program improperly handles input passed through the sendmail command, allowing remote attackers to execute arbitrary commands on the affected system without authentication. Specifically, the flaw enables command injection via crafted email messages that exploit the way vacation invokes sendmail, leading to potential full system compromise. The affected versions include 6.2, 9, 10.00, 10.09, and 10.24, all of which are legacy versions dating back to the late 1990s. The CVSS score of 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) reflects the ease of remote exploitation without authentication, and the significant impact on confidentiality, integrity, and availability. No patches are available for this vulnerability, and no known exploits have been observed in the wild, likely due to the age of the software and its declining use. However, systems still running these versions of the vacation program remain at risk of remote compromise if exposed to untrusted email traffic.

Potential Impact

For European organizations, the impact of this vulnerability could be severe if legacy systems running vulnerable versions of the vacation program are still operational and exposed to the internet or untrusted email sources. Successful exploitation could lead to unauthorized command execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt services, or use compromised hosts as pivot points for further attacks within the network. Although modern email infrastructure and security controls have largely replaced such legacy utilities, certain government agencies, academic institutions, or organizations with legacy Unix-based systems might still be vulnerable. This could result in data breaches, operational disruptions, and reputational damage, especially if critical infrastructure or sensitive personal data governed by GDPR is involved.

Mitigation Recommendations

Given that no official patches are available for this vulnerability, European organizations should prioritize the following mitigation steps: 1) Identify and inventory all systems running the vacation program, especially the affected versions. 2) Disable or remove the vacation program entirely if it is not essential, as it is an outdated utility with known security issues. 3) If the vacation program must be used, isolate these systems from direct internet exposure and untrusted email sources by implementing strict email filtering and network segmentation. 4) Employ modern email gateways with advanced threat protection to block malicious payloads and command injection attempts. 5) Monitor system logs and network traffic for unusual activity indicative of exploitation attempts. 6) Consider upgrading to modern, supported mail handling and auto-reply solutions that do not have this vulnerability. 7) Implement strict access controls and least privilege principles on affected systems to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deb2c

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 12:12:04 PM

Last updated: 2/7/2026, 11:12:45 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats