Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0466: The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or wr

0
High
VulnerabilityCVE-1999-0466cve-1999-0466
Published: Wed Apr 21 1999 (04/21/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: netbsd
Product: netbsd

Description

The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device.

AI-Powered Analysis

AILast updated: 06/28/2025, 02:10:38 UTC

Technical Analysis

CVE-1999-0466 is a high-severity local vulnerability affecting NetBSD versions 1.3 through 1.3.3. The issue stems from the SVR4 /dev/wabi special device file, which is designed to provide compatibility for SVR4 binaries. This device file improperly allows local users to perform arbitrary read and write operations on the disk associated with the device. Essentially, any local user can leverage this device file to access or modify arbitrary files on the system, bypassing normal file permission checks. The vulnerability requires local access, meaning an attacker must already have some form of login or shell access to the affected system. The CVSS score of 7.2 reflects the high impact on confidentiality, integrity, and availability, as an attacker can read sensitive files, alter system binaries or configuration files, and potentially disrupt system operations. The vulnerability does not require user interaction beyond local access and has low attack complexity. No patches are available for this vulnerability, and there are no known exploits in the wild documented. Given the age of the affected NetBSD versions (released in the late 1990s), this vulnerability primarily concerns legacy systems that have not been updated or replaced.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those maintaining legacy NetBSD 1.3.x systems, which are very old and uncommon in modern enterprise environments. If such systems are still in use, an attacker with local access could compromise sensitive data, modify critical system files, or disrupt services, leading to potential data breaches, operational downtime, and loss of integrity of systems. This could be particularly damaging in sectors where legacy systems are retained for specific applications, such as industrial control, research, or archival systems. The vulnerability could facilitate privilege escalation or lateral movement within a network if an attacker gains initial local access. However, the requirement for local access and the obsolescence of the affected versions limit the overall risk to most contemporary European organizations.

Mitigation Recommendations

Given that no patches are available for this vulnerability, the primary mitigation strategy is to upgrade or replace affected NetBSD systems with supported, updated versions that do not contain this vulnerability. Organizations should audit their environments to identify any legacy NetBSD 1.3.x installations and plan for their decommissioning or migration. If upgrading is not immediately feasible, strict access controls should be enforced to limit local user access to trusted personnel only. Additionally, monitoring and logging of local access attempts and unusual file operations related to /dev/wabi should be implemented to detect potential exploitation attempts. Employing host-based intrusion detection systems (HIDS) and ensuring physical security of systems can further reduce risk. Finally, educating administrators about the risks of legacy systems and the importance of timely updates is essential.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7def8a

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/28/2025, 2:10:38 AM

Last updated: 2/7/2026, 7:41:10 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats