Skip to main content

CVE-1999-0124: Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files

High
VulnerabilityCVE-1999-0124cve-1999-0124
Published: Mon Aug 09 1993 (08/09/1993, 04:00:00 UTC)
Source: NVD
Vendor/Project: university_of_minnesota
Product: gopherd

Description

Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:26:11 UTC

Technical Analysis

CVE-1999-0124 is a critical vulnerability affecting UMN gopher and gopher+ server software versions 1.12 and 2.0x. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the server that the gopher daemon process has access to. This is due to insufficient access control and input validation in the gopherd service, which was designed to serve files and directories over the Gopher protocol, a precursor to the modern web. Because the gopher daemon runs with the privileges of the user account under which it operates, any files accessible to that user can potentially be exposed. The vulnerability has a CVSS v2 base score of 10.0, indicating critical severity, with attack vector being network-based, no authentication required, and complete compromise of confidentiality, integrity, and availability possible. Although this vulnerability dates back to 1993 and affects legacy software that is largely obsolete today, it remains a notable example of early remote file disclosure flaws. No patches are available, and no known exploits are currently active in the wild. However, if legacy systems running these versions of gopherd are still in use, they remain vulnerable to remote file disclosure attacks.

Potential Impact

For European organizations, the direct impact of this vulnerability today is likely minimal due to the obsolescence of the Gopher protocol and the rarity of gopherd deployment in modern environments. However, any legacy systems still running UMN gopher or gopher+ servers could be at risk of sensitive data exposure, including configuration files, credentials, or proprietary information accessible to the gopher daemon user. This could lead to further compromise of internal networks if attackers leverage disclosed information for lateral movement or privilege escalation. Additionally, organizations in sectors with legacy infrastructure—such as academic institutions, research centers, or governmental archives—might still have these services active, increasing their risk. The vulnerability’s ability to fully compromise confidentiality, integrity, and availability means that attackers could not only read sensitive files but potentially disrupt service or modify data if combined with other exploits. Given the high CVSS score and network accessibility without authentication, any exposed legacy gopherd service represents a critical security risk.

Mitigation Recommendations

Given the absence of patches, the primary mitigation is to immediately identify and decommission any UMN gopher or gopher+ servers running vulnerable versions (1.12 and 2.0x). Organizations should perform network scans to detect active gopherd services and verify their versions. If legacy gopher services are required for operational reasons, they should be isolated within secure network segments with strict access controls and monitored closely for suspicious activity. Access to the gopher daemon should be restricted via firewall rules to trusted IP addresses only. Additionally, running the gopher daemon under a dedicated, least-privileged user account with minimal file system permissions can limit the scope of file disclosure. Organizations should also consider migrating any legacy content served by gopherd to modern, secure protocols such as HTTPS. Regular audits of legacy systems and network services should be conducted to identify and remediate outdated software that poses security risks.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de3f9

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 5:26:11 PM

Last updated: 7/29/2025, 7:47:40 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats