Skip to main content

CVE-1999-0480: Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.

Low
VulnerabilityCVE-1999-0480cve-1999-0480denial of service
Published: Thu Apr 01 1999 (04/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: midnight_commander
Product: midnight_commander

Description

Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:56:04 UTC

Technical Analysis

CVE-1999-0480 is a vulnerability identified in Midnight Commander version 4.x, a text-based file manager commonly used on Unix-like systems. The vulnerability allows local attackers to cause a denial of service (DoS) condition by exploiting a symbolic link (symlink) attack. Specifically, the attacker can create or manipulate symlinks in a way that causes Midnight Commander to malfunction or crash when it attempts to access or process these links. Since the attack requires local access, the attacker must have the ability to execute commands or create files on the target system. The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to become unresponsive or crash. The CVSS score of 2.1 (low severity) reflects the limited scope and impact of this vulnerability, as well as the requirement for local access and low complexity of the attack. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specific conditions required for exploitation, this issue is primarily of historical interest or relevant for legacy systems still running Midnight Commander 4.x without updates.

Potential Impact

For European organizations, the impact of this vulnerability is generally low. The requirement for local access limits the attack surface to insiders or users who already have some level of system access, reducing the risk of remote exploitation. The denial of service effect could disrupt operations for users relying on Midnight Commander for file management, potentially causing minor productivity loss or inconvenience. However, since the vulnerability does not allow privilege escalation, data theft, or system compromise, the overall risk to critical infrastructure or sensitive data is minimal. Organizations running legacy Unix-like systems with Midnight Commander 4.x installed should be aware of this vulnerability, but modern environments are unlikely to be affected. The lack of a patch means that mitigation relies on operational controls rather than software fixes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Restrict local access to trusted users only, minimizing the risk of malicious symlink creation. 2) Monitor and audit file system changes, especially symlink creation in directories accessed by Midnight Commander, to detect suspicious activity. 3) Consider upgrading to a more recent version of Midnight Commander or alternative file management tools that do not exhibit this vulnerability. 4) Employ file system permissions and access controls to prevent unauthorized users from creating or modifying symlinks in sensitive directories. 5) If upgrading is not feasible, isolate systems running vulnerable versions to limit exposure and reduce the risk of insider threats. 6) Educate users about the risks of symlink attacks and encourage cautious use of file management utilities in multi-user environments.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def3c

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:56:04 PM

Last updated: 8/13/2025, 11:19:01 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats