CVE-1999-0370: In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary fi
In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.
AI Analysis
Technical Summary
CVE-1999-0370 is a vulnerability affecting Sun Solaris and SunOS operating systems, specifically in the man and catman utilities. These utilities are used for displaying manual pages and their formatted versions, respectively. The vulnerability allows an attacker with local access to overwrite arbitrary files on the system. This is possible due to insecure handling of temporary files or file operations within these utilities, which can be exploited to replace or modify files that the attacker should not have permission to alter. The affected versions include Solaris 2.4, 2.5.1, 2.6, 7.0, 5.4, 5.5, 5.5.1, and 5.7, covering a broad range of Solaris releases from the late 1990s. The CVSS score is 4.6 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits in the wild have been reported. The vulnerability primarily affects legacy systems that are still running these older Solaris versions and using the vulnerable man and catman utilities.
Potential Impact
For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Solaris systems in their infrastructure. The ability to overwrite arbitrary files could lead to privilege escalation, unauthorized modification of critical system files, or disruption of system operations. This could compromise the confidentiality and integrity of sensitive data and potentially affect system availability if critical files are overwritten or corrupted. While the vulnerability requires local access, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges or maintain persistence. Given the age of the affected Solaris versions, most modern European enterprises may have migrated away from these systems, but certain sectors such as telecommunications, industrial control, or government agencies might still rely on legacy Solaris systems, making them vulnerable.
Mitigation Recommendations
Since no official patch is available, European organizations should consider the following specific mitigations: 1) Restrict local access strictly to trusted users and enforce strong access controls and monitoring on Solaris systems. 2) Disable or restrict use of the vulnerable man and catman utilities where possible, or replace them with safer alternatives if available. 3) Employ file integrity monitoring to detect unauthorized changes to critical system files. 4) Use mandatory access control (MAC) frameworks or Solaris Trusted Extensions to limit the ability of processes to overwrite arbitrary files. 5) Plan and prioritize migration from legacy Solaris versions to supported, updated operating systems that do not contain this vulnerability. 6) Conduct regular audits and monitoring for suspicious local activity that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-1999-0370: In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary fi
Description
In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.
AI-Powered Analysis
Technical Analysis
CVE-1999-0370 is a vulnerability affecting Sun Solaris and SunOS operating systems, specifically in the man and catman utilities. These utilities are used for displaying manual pages and their formatted versions, respectively. The vulnerability allows an attacker with local access to overwrite arbitrary files on the system. This is possible due to insecure handling of temporary files or file operations within these utilities, which can be exploited to replace or modify files that the attacker should not have permission to alter. The affected versions include Solaris 2.4, 2.5.1, 2.6, 7.0, 5.4, 5.5, 5.5.1, and 5.7, covering a broad range of Solaris releases from the late 1990s. The CVSS score is 4.6 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits in the wild have been reported. The vulnerability primarily affects legacy systems that are still running these older Solaris versions and using the vulnerable man and catman utilities.
Potential Impact
For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Solaris systems in their infrastructure. The ability to overwrite arbitrary files could lead to privilege escalation, unauthorized modification of critical system files, or disruption of system operations. This could compromise the confidentiality and integrity of sensitive data and potentially affect system availability if critical files are overwritten or corrupted. While the vulnerability requires local access, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges or maintain persistence. Given the age of the affected Solaris versions, most modern European enterprises may have migrated away from these systems, but certain sectors such as telecommunications, industrial control, or government agencies might still rely on legacy Solaris systems, making them vulnerable.
Mitigation Recommendations
Since no official patch is available, European organizations should consider the following specific mitigations: 1) Restrict local access strictly to trusted users and enforce strong access controls and monitoring on Solaris systems. 2) Disable or restrict use of the vulnerable man and catman utilities where possible, or replace them with safer alternatives if available. 3) Employ file integrity monitoring to detect unauthorized changes to critical system files. 4) Use mandatory access control (MAC) frameworks or Solaris Trusted Extensions to limit the ability of processes to overwrite arbitrary files. 5) Plan and prioritize migration from legacy Solaris versions to supported, updated operating systems that do not contain this vulnerability. 6) Conduct regular audits and monitoring for suspicious local activity that could indicate exploitation attempts.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7dee10
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 7:54:44 PM
Last updated: 2/7/2026, 4:49:35 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2073: SQL Injection in itsourcecode School Management System
MediumCVE-2025-31990: CWE-770 Allocation of Resources Without Limits or Throttling in HCLSoftware HCL DevOps Velocity
MediumCVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.