Skip to main content

CVE-1999-0298: ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remo

High
VulnerabilityCVE-1999-0298cve-1999-0298
Published: Wed Feb 05 1997 (02/05/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: slackware
Product: slackware_linux

Description

ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:57:53 UTC

Technical Analysis

CVE-1999-0298 is a high-severity vulnerability affecting the ypbind daemon when run with the -ypset and -ypsetme options on Linux Slackware (versions 2.1, 2.2, 2.3, 4.1.3, and 4.1.4) and SunOS systems. ypbind is a component of the Network Information Service (NIS), which is used for distributing system configuration data such as user and host names across a network. The vulnerability arises due to improper handling of file paths, allowing both local and remote attackers to perform directory traversal (".." or dot-dot) attacks. This flaw enables attackers to overwrite arbitrary files on the affected system by crafting malicious requests that exploit the path traversal weakness. The vulnerability does not require authentication and can be exploited remotely over the network, increasing its risk profile. The CVSS v2 score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no authentication required. Although no patches are currently available, the vulnerability is well-documented and affects legacy systems that may still be in use in certain environments. Exploitation could lead to unauthorized modification or corruption of critical system files, potentially resulting in privilege escalation, denial of service, or further compromise of the affected host.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those still operating legacy Linux Slackware or SunOS systems with NIS enabled and ypbind configured with the vulnerable options. Successful exploitation could allow attackers to overwrite critical configuration or system files, leading to unauthorized access, disruption of services, or complete system compromise. This is particularly concerning for organizations in sectors such as government, research institutions, or industrial environments where legacy Unix systems may still be in operation. The ability to exploit this vulnerability remotely without authentication increases the attack surface and risk of widespread exploitation. Additionally, compromised systems could be leveraged as footholds for lateral movement within networks, threatening confidentiality and integrity of sensitive data. Given the age of the vulnerability, many modern systems may not be affected; however, legacy infrastructure in European organizations remains at risk, potentially impacting operational continuity and data security.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should take immediate compensating controls. First, disable the ypbind service or avoid using the -ypset and -ypsetme options unless absolutely necessary. If NIS functionality is required, consider migrating to more secure directory services such as LDAP or modern identity management solutions. Implement strict network segmentation and firewall rules to restrict access to NIS services only to trusted hosts and networks. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious file modifications and unusual ypbind activity. Regularly audit systems for legacy software usage and plan for phased decommissioning or upgrading of vulnerable systems. Additionally, enforce the principle of least privilege on affected hosts to limit the potential damage from exploitation. Finally, maintain comprehensive backups of critical system files to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de64a

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:57:53 AM

Last updated: 7/26/2025, 12:56:26 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats