Skip to main content

CVE-1999-0522: The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate.

High
VulnerabilityCVE-1999-0522cve-1999-0522
Published: Tue May 28 1996 (05/28/1996, 04:00:00 UTC)
Source: NVD

Description

The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate.

AI-Powered Analysis

AILast updated: 07/01/2025, 15:27:43 UTC

Technical Analysis

CVE-1999-0522 describes a vulnerability related to inappropriate permissions set on system-critical NIS+ tables, such as the passwd table. NIS+ (Network Information Service Plus) is a directory service used primarily in Unix environments to manage network-wide configuration data, including user account information. The passwd table contains sensitive user authentication data, and improper permissions on this table can allow unauthorized users to read or modify critical system information. This vulnerability arises when the access control settings on these tables are too permissive, potentially allowing local or remote attackers to gain unauthorized access to confidential data, alter user credentials, or disrupt system operations. The CVSS score of 7.2 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with a low attack complexity and no authentication required, but limited to local access (AV:L). Although this vulnerability was published in 1996 and no patches are available, it remains relevant for legacy Unix systems still using NIS+. Exploitation could lead to full system compromise by exposing or altering user credentials and system configuration data.

Potential Impact

For European organizations, especially those operating legacy Unix environments or critical infrastructure relying on NIS+, this vulnerability poses a serious risk. Unauthorized access to the passwd table could lead to credential theft, privilege escalation, and unauthorized system control, potentially resulting in data breaches, service disruption, and loss of trust. Given the sensitivity of user authentication data, exploitation could facilitate lateral movement within networks and compromise other connected systems. Sectors such as government, finance, telecommunications, and energy, which often maintain legacy systems for operational continuity, are particularly at risk. The impact is compounded by the lack of available patches, requiring organizations to rely on configuration and access control hardening to mitigate risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first audit all NIS+ tables to verify and enforce strict permission settings, ensuring that only authorized system administrators have read/write access to critical tables like passwd. Transitioning away from NIS+ to more modern and secure directory services such as LDAP with strong authentication and encryption mechanisms is strongly recommended. Where migration is not immediately feasible, organizations should implement network segmentation to isolate NIS+ servers, restrict local access to trusted personnel only, and monitor access logs for suspicious activity. Employing host-based intrusion detection systems (HIDS) can help detect unauthorized access attempts. Additionally, organizations should conduct regular security assessments and user privilege reviews to minimize exposure. Given the absence of patches, proactive configuration management and system hardening are essential to reduce risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de4d8

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 3:27:43 PM

Last updated: 7/28/2025, 7:03:37 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats