Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0480: Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.

0
Low
VulnerabilityCVE-1999-0480cve-1999-0480denial of service
Published: Thu Apr 01 1999 (04/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: midnight_commander
Product: midnight_commander

Description

Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:56:04 UTC

Technical Analysis

CVE-1999-0480 is a vulnerability identified in Midnight Commander version 4.x, a text-based file manager commonly used on Unix-like systems. The vulnerability allows local attackers to cause a denial of service (DoS) condition by exploiting a symbolic link (symlink) attack. Specifically, the attacker can create or manipulate symlinks in a way that causes Midnight Commander to malfunction or crash when it attempts to access or process these links. Since the attack requires local access, the attacker must have the ability to execute commands or create files on the target system. The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to become unresponsive or crash. The CVSS score of 2.1 (low severity) reflects the limited scope and impact of this vulnerability, as well as the requirement for local access and low complexity of the attack. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specific conditions required for exploitation, this issue is primarily of historical interest or relevant for legacy systems still running Midnight Commander 4.x without updates.

Potential Impact

For European organizations, the impact of this vulnerability is generally low. The requirement for local access limits the attack surface to insiders or users who already have some level of system access, reducing the risk of remote exploitation. The denial of service effect could disrupt operations for users relying on Midnight Commander for file management, potentially causing minor productivity loss or inconvenience. However, since the vulnerability does not allow privilege escalation, data theft, or system compromise, the overall risk to critical infrastructure or sensitive data is minimal. Organizations running legacy Unix-like systems with Midnight Commander 4.x installed should be aware of this vulnerability, but modern environments are unlikely to be affected. The lack of a patch means that mitigation relies on operational controls rather than software fixes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Restrict local access to trusted users only, minimizing the risk of malicious symlink creation. 2) Monitor and audit file system changes, especially symlink creation in directories accessed by Midnight Commander, to detect suspicious activity. 3) Consider upgrading to a more recent version of Midnight Commander or alternative file management tools that do not exhibit this vulnerability. 4) Employ file system permissions and access controls to prevent unauthorized users from creating or modifying symlinks in sensitive directories. 5) If upgrading is not feasible, isolate systems running vulnerable versions to limit exposure and reduce the risk of insider threats. 6) Educate users about the risks of symlink attacks and encourage cautious use of file management utilities in multi-user environments.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7def3c

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:56:04 PM

Last updated: 2/7/2026, 8:22:29 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats