Skip to main content

CVE-1999-0370: In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary fi

Medium
VulnerabilityCVE-1999-0370cve-1999-0370
Published: Wed Feb 10 1999 (02/10/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:54:44 UTC

Technical Analysis

CVE-1999-0370 is a vulnerability affecting Sun Solaris and SunOS operating systems, specifically in the man and catman utilities. These utilities are used for displaying manual pages and their formatted versions, respectively. The vulnerability allows an attacker with local access to overwrite arbitrary files on the system. This is possible due to insecure handling of temporary files or file operations within these utilities, which can be exploited to replace or modify files that the attacker should not have permission to alter. The affected versions include Solaris 2.4, 2.5.1, 2.6, 7.0, 5.4, 5.5, 5.5.1, and 5.7, covering a broad range of Solaris releases from the late 1990s. The CVSS score is 4.6 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits in the wild have been reported. The vulnerability primarily affects legacy systems that are still running these older Solaris versions and using the vulnerable man and catman utilities.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Solaris systems in their infrastructure. The ability to overwrite arbitrary files could lead to privilege escalation, unauthorized modification of critical system files, or disruption of system operations. This could compromise the confidentiality and integrity of sensitive data and potentially affect system availability if critical files are overwritten or corrupted. While the vulnerability requires local access, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges or maintain persistence. Given the age of the affected Solaris versions, most modern European enterprises may have migrated away from these systems, but certain sectors such as telecommunications, industrial control, or government agencies might still rely on legacy Solaris systems, making them vulnerable.

Mitigation Recommendations

Since no official patch is available, European organizations should consider the following specific mitigations: 1) Restrict local access strictly to trusted users and enforce strong access controls and monitoring on Solaris systems. 2) Disable or restrict use of the vulnerable man and catman utilities where possible, or replace them with safer alternatives if available. 3) Employ file integrity monitoring to detect unauthorized changes to critical system files. 4) Use mandatory access control (MAC) frameworks or Solaris Trusted Extensions to limit the ability of processes to overwrite arbitrary files. 5) Plan and prioritize migration from legacy Solaris versions to supported, updated operating systems that do not contain this vulnerability. 6) Conduct regular audits and monitoring for suspicious local activity that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dee10

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:54:44 PM

Last updated: 7/31/2025, 9:12:50 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats