CVE-1999-0124: Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
AI Analysis
Technical Summary
CVE-1999-0124 is a critical vulnerability affecting UMN gopher and gopher+ server software versions 1.12 and 2.0x. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the server that the gopher daemon process has access to. This is due to insufficient access control and input validation in the gopherd service, which was designed to serve files and directories over the Gopher protocol, a precursor to the modern web. Because the gopher daemon runs with the privileges of the user account under which it operates, any files accessible to that user can potentially be exposed. The vulnerability has a CVSS v2 base score of 10.0, indicating critical severity, with attack vector being network-based, no authentication required, and complete compromise of confidentiality, integrity, and availability possible. Although this vulnerability dates back to 1993 and affects legacy software that is largely obsolete today, it remains a notable example of early remote file disclosure flaws. No patches are available, and no known exploits are currently active in the wild. However, if legacy systems running these versions of gopherd are still in use, they remain vulnerable to remote file disclosure attacks.
Potential Impact
For European organizations, the direct impact of this vulnerability today is likely minimal due to the obsolescence of the Gopher protocol and the rarity of gopherd deployment in modern environments. However, any legacy systems still running UMN gopher or gopher+ servers could be at risk of sensitive data exposure, including configuration files, credentials, or proprietary information accessible to the gopher daemon user. This could lead to further compromise of internal networks if attackers leverage disclosed information for lateral movement or privilege escalation. Additionally, organizations in sectors with legacy infrastructure—such as academic institutions, research centers, or governmental archives—might still have these services active, increasing their risk. The vulnerability’s ability to fully compromise confidentiality, integrity, and availability means that attackers could not only read sensitive files but potentially disrupt service or modify data if combined with other exploits. Given the high CVSS score and network accessibility without authentication, any exposed legacy gopherd service represents a critical security risk.
Mitigation Recommendations
Given the absence of patches, the primary mitigation is to immediately identify and decommission any UMN gopher or gopher+ servers running vulnerable versions (1.12 and 2.0x). Organizations should perform network scans to detect active gopherd services and verify their versions. If legacy gopher services are required for operational reasons, they should be isolated within secure network segments with strict access controls and monitored closely for suspicious activity. Access to the gopher daemon should be restricted via firewall rules to trusted IP addresses only. Additionally, running the gopher daemon under a dedicated, least-privileged user account with minimal file system permissions can limit the scope of file disclosure. Organizations should also consider migrating any legacy content served by gopherd to modern, secure protocols such as HTTPS. Regular audits of legacy systems and network services should be conducted to identify and remediate outdated software that poses security risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden
CVE-1999-0124: Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files
Description
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
AI-Powered Analysis
Technical Analysis
CVE-1999-0124 is a critical vulnerability affecting UMN gopher and gopher+ server software versions 1.12 and 2.0x. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the server that the gopher daemon process has access to. This is due to insufficient access control and input validation in the gopherd service, which was designed to serve files and directories over the Gopher protocol, a precursor to the modern web. Because the gopher daemon runs with the privileges of the user account under which it operates, any files accessible to that user can potentially be exposed. The vulnerability has a CVSS v2 base score of 10.0, indicating critical severity, with attack vector being network-based, no authentication required, and complete compromise of confidentiality, integrity, and availability possible. Although this vulnerability dates back to 1993 and affects legacy software that is largely obsolete today, it remains a notable example of early remote file disclosure flaws. No patches are available, and no known exploits are currently active in the wild. However, if legacy systems running these versions of gopherd are still in use, they remain vulnerable to remote file disclosure attacks.
Potential Impact
For European organizations, the direct impact of this vulnerability today is likely minimal due to the obsolescence of the Gopher protocol and the rarity of gopherd deployment in modern environments. However, any legacy systems still running UMN gopher or gopher+ servers could be at risk of sensitive data exposure, including configuration files, credentials, or proprietary information accessible to the gopher daemon user. This could lead to further compromise of internal networks if attackers leverage disclosed information for lateral movement or privilege escalation. Additionally, organizations in sectors with legacy infrastructure—such as academic institutions, research centers, or governmental archives—might still have these services active, increasing their risk. The vulnerability’s ability to fully compromise confidentiality, integrity, and availability means that attackers could not only read sensitive files but potentially disrupt service or modify data if combined with other exploits. Given the high CVSS score and network accessibility without authentication, any exposed legacy gopherd service represents a critical security risk.
Mitigation Recommendations
Given the absence of patches, the primary mitigation is to immediately identify and decommission any UMN gopher or gopher+ servers running vulnerable versions (1.12 and 2.0x). Organizations should perform network scans to detect active gopherd services and verify their versions. If legacy gopher services are required for operational reasons, they should be isolated within secure network segments with strict access controls and monitored closely for suspicious activity. Access to the gopher daemon should be restricted via firewall rules to trusted IP addresses only. Additionally, running the gopher daemon under a dedicated, least-privileged user account with minimal file system permissions can limit the scope of file disclosure. Organizations should also consider migrating any legacy content served by gopherd to modern, secure protocols such as HTTPS. Regular audits of legacy systems and network services should be conducted to identify and remediate outdated software that poses security risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de3f9
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/1/2025, 5:26:11 PM
Last updated: 7/29/2025, 7:47:40 PM
Views: 15
Related Threats
CVE-2025-8816: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8810: Stack-based Buffer Overflow in Tenda AC20
HighAgentFlayer 0-click exploit abuses ChatGPT Connectors to Steal 3rd-party app data
HighCVE-2025-8758: Least Privilege Violation in TRENDnet TEW-822DRE
HighCVE-2025-8757: Least Privilege Violation in TRENDnet TV-IP110WN
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.