Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0370: In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary fi

0
Medium
VulnerabilityCVE-1999-0370cve-1999-0370
Published: Wed Feb 10 1999 (02/10/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:54:44 UTC

Technical Analysis

CVE-1999-0370 is a vulnerability affecting Sun Solaris and SunOS operating systems, specifically in the man and catman utilities. These utilities are used for displaying manual pages and their formatted versions, respectively. The vulnerability allows an attacker with local access to overwrite arbitrary files on the system. This is possible due to insecure handling of temporary files or file operations within these utilities, which can be exploited to replace or modify files that the attacker should not have permission to alter. The affected versions include Solaris 2.4, 2.5.1, 2.6, 7.0, 5.4, 5.5, 5.5.1, and 5.7, covering a broad range of Solaris releases from the late 1990s. The CVSS score is 4.6 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits in the wild have been reported. The vulnerability primarily affects legacy systems that are still running these older Solaris versions and using the vulnerable man and catman utilities.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Solaris systems in their infrastructure. The ability to overwrite arbitrary files could lead to privilege escalation, unauthorized modification of critical system files, or disruption of system operations. This could compromise the confidentiality and integrity of sensitive data and potentially affect system availability if critical files are overwritten or corrupted. While the vulnerability requires local access, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges or maintain persistence. Given the age of the affected Solaris versions, most modern European enterprises may have migrated away from these systems, but certain sectors such as telecommunications, industrial control, or government agencies might still rely on legacy Solaris systems, making them vulnerable.

Mitigation Recommendations

Since no official patch is available, European organizations should consider the following specific mitigations: 1) Restrict local access strictly to trusted users and enforce strong access controls and monitoring on Solaris systems. 2) Disable or restrict use of the vulnerable man and catman utilities where possible, or replace them with safer alternatives if available. 3) Employ file integrity monitoring to detect unauthorized changes to critical system files. 4) Use mandatory access control (MAC) frameworks or Solaris Trusted Extensions to limit the ability of processes to overwrite arbitrary files. 5) Plan and prioritize migration from legacy Solaris versions to supported, updated operating systems that do not contain this vulnerability. 6) Conduct regular audits and monitoring for suspicious local activity that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dee10

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:54:44 PM

Last updated: 2/7/2026, 4:49:35 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats