Skip to main content

CVE-1999-0133: fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain

Low
VulnerabilityCVE-1999-0133cve-1999-0133
Published: Wed Aug 14 1996 (08/14/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: adobe
Product: framemaker

Description

fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:43:33 UTC

Technical Analysis

CVE-1999-0133 is a vulnerability in the fm_fls license server component of Adobe FrameMaker, a document processing software. The vulnerability allows local users on the affected system to overwrite arbitrary files, which can lead to privilege escalation and potentially gaining root access. This is a local attack vector, meaning an attacker must have some level of access to the system already. The vulnerability dates back to 1996 and has a low CVSS score of 2.1, reflecting limited impact and exploitability. The attack does not require authentication but does require local access, and it impacts the integrity of the system by allowing unauthorized file modification. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability primarily affects older versions of Adobe FrameMaker that include the fm_fls license server, which was used to manage software licensing. Given the age of the vulnerability and the product, it is unlikely to be present in modern environments, but legacy systems may still be at risk.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to its age and the requirement for local access. However, organizations that still use legacy systems with Adobe FrameMaker and the fm_fls license server could face risks of local privilege escalation, potentially leading to full system compromise. This could result in unauthorized changes to critical files, disruption of document processing workflows, and possible lateral movement within the network if attackers gain root access. The confidentiality impact is minimal since the vulnerability does not directly expose data, but integrity and availability could be affected if attackers modify or delete important files. The risk is higher in environments where legacy software is maintained for compatibility or archival purposes without proper isolation or updated security controls.

Mitigation Recommendations

Given that no patch is available, European organizations should focus on mitigating risk through compensating controls. These include: 1) Restricting local access to systems running Adobe FrameMaker and the fm_fls license server to trusted personnel only. 2) Isolating legacy systems from the main network to limit the potential for lateral movement. 3) Employing strict file system permissions and monitoring to detect unauthorized file modifications. 4) Considering virtualization or containerization to sandbox legacy applications. 5) Planning for migration away from unsupported legacy software to modern, supported alternatives. 6) Implementing robust endpoint security solutions that can detect suspicious local activity indicative of privilege escalation attempts. 7) Regularly auditing legacy systems for signs of compromise and ensuring backups are available to recover from potential file tampering.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de50e

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:43:33 AM

Last updated: 8/12/2025, 11:31:41 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats