Skip to main content

CVE-1999-0062: The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakag

High
VulnerabilityCVE-1999-0062cve-1999-0062
Published: Mon Aug 03 1998 (08/03/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: openbsd
Product: openbsd

Description

The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.

AI-Powered Analysis

AILast updated: 06/29/2025, 17:27:10 UTC

Technical Analysis

CVE-1999-0062 is a high-severity vulnerability affecting the chpass command in OpenBSD version 2.3. The vulnerability arises due to file descriptor leakage within the chpass utility, which is used to change user password database entries. Specifically, a local user can exploit this flaw to escalate privileges and gain root access on the affected system. The vulnerability is classified as local (AV:L), requiring local access to the system, with low attack complexity (AC:L) and no authentication required (Au:N). Successful exploitation results in complete compromise of confidentiality, integrity, and availability (C:C/I:C/A:C) of the system. This vulnerability dates back to 1998 and no patch is available for the affected version, which is an outdated release of OpenBSD. The chpass command's improper handling of file descriptors allows a local attacker to manipulate or leak privileged information, ultimately leading to privilege escalation. Although no known exploits are currently in the wild, the vulnerability's nature and impact make it a critical concern for any systems still running the affected OpenBSD version.

Potential Impact

For European organizations, the impact of this vulnerability is significant primarily if legacy OpenBSD 2.3 systems are still in use. Given the age of the vulnerability and the affected version, it is unlikely to affect modern deployments; however, any legacy infrastructure relying on this version could be fully compromised by a local attacker. The attacker gaining root access could lead to unauthorized data access, system manipulation, and disruption of services. This could affect confidentiality of sensitive data, integrity of system configurations, and availability of critical services. In sectors such as government, finance, or critical infrastructure within Europe, where legacy systems sometimes persist, this vulnerability could be exploited by insiders or attackers with physical or remote local access, leading to severe operational and reputational damage.

Mitigation Recommendations

Since no patch is available for OpenBSD 2.3, the primary mitigation is to upgrade to a supported, patched version of OpenBSD where this vulnerability is resolved. Organizations should conduct an inventory to identify any systems running OpenBSD 2.3 and plan immediate migration. In environments where upgrade is not immediately feasible, strict access controls should be enforced to limit local user access, including disabling unnecessary accounts and implementing strong physical security measures. Monitoring and auditing local user activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, employing mandatory access control mechanisms or sandboxing techniques could reduce the risk of privilege escalation. Finally, organizations should ensure that all systems are regularly updated and that legacy systems are phased out to prevent exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea87

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 5:27:10 PM

Last updated: 8/17/2025, 7:59:54 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats