Skip to main content

CVE-1999-0078: pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands

Low
VulnerabilityCVE-1999-0078cve-1999-0078
Published: Thu Apr 18 1996 (04/18/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: ncr
Product: mp-ras

Description

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:56:04 UTC

Technical Analysis

CVE-1999-0078 is a vulnerability in the pcnfsd daemon (also known as rpc.pcnfsd), which is part of the NCR MP-RAS product suite. This vulnerability allows local users to manipulate file permissions or execute arbitrary commands by exploiting the arguments passed in the RPC (Remote Procedure Call) interface. The affected versions span multiple releases of MP-RAS, including versions 2.03 through 6.2 and several intermediate versions. The vulnerability arises because pcnfsd does not properly validate or restrict the input parameters it receives, enabling a local attacker to escalate privileges or alter system files by changing permissions or injecting commands. The CVSS score is low (1.9), reflecting that exploitation requires local access, moderate complexity, and does not impact confidentiality or availability significantly. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of this vulnerability (published in 1996), it primarily affects legacy systems still running these older MP-RAS versions. The risk is limited to local users who already have some access to the system, but the ability to execute arbitrary commands can lead to privilege escalation and compromise of system integrity.

Potential Impact

For European organizations, the impact of CVE-1999-0078 is generally low due to the obsolescence of the affected software and the requirement for local access to exploit the vulnerability. However, organizations that maintain legacy systems running NCR MP-RAS versions affected by this vulnerability could face risks of unauthorized privilege escalation and unauthorized modification of file permissions. This could lead to unauthorized changes in system configurations or the execution of malicious code, potentially compromising system integrity and leading to further lateral movement within the network. In critical infrastructure or industrial environments where legacy systems are still in operation, such exploitation could disrupt operations or lead to data integrity issues. However, the lack of remote exploitability and the absence of known active exploits reduce the immediate threat level. Nonetheless, organizations should be aware of this vulnerability when performing risk assessments on legacy systems and consider isolating or upgrading affected systems to mitigate potential risks.

Mitigation Recommendations

Given that no official patches are available for CVE-1999-0078, mitigation must focus on compensating controls. Organizations should: 1) Restrict local access to systems running affected MP-RAS versions to trusted administrators only, minimizing the risk of local exploitation. 2) Implement strict access controls and monitoring on legacy systems to detect any unauthorized changes in file permissions or suspicious command executions. 3) Where possible, isolate legacy MP-RAS systems from the main network to limit potential lateral movement if compromised. 4) Consider migrating or upgrading legacy systems to supported platforms that do not contain this vulnerability. 5) Employ host-based intrusion detection systems (HIDS) to monitor for anomalous RPC calls or unauthorized privilege escalations. 6) Conduct regular audits of file permissions and system configurations on affected systems to detect unauthorized changes early. These steps go beyond generic advice by focusing on compensating controls tailored to legacy environments where patching is not feasible.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de4d0

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:56:04 AM

Last updated: 8/3/2025, 3:01:50 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats