CVE-1999-0661: A system is running a version of software that was replaced with a Trojan Horse at one of its distri
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
AI Analysis
Technical Summary
CVE-1999-0661 describes a critical security vulnerability involving the distribution of Trojan Horse-infected versions of widely used software packages. Specifically, certain versions of software such as TCP Wrappers 7.6, util-linux 2.9g, wuarchive ftpd (wuftpd) versions 2.2 and 2.1f, IRC client ircII 2.2.9, OpenSSH 3.4p1, and Sendmail 8.12.6 were replaced at their distribution points with maliciously altered versions containing Trojan Horses. This means that users who downloaded and installed these compromised versions inadvertently introduced backdoors or malicious code into their systems. The Trojan Horse could allow attackers to gain unauthorized remote access, execute arbitrary code, exfiltrate sensitive data, or disrupt system operations. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L), making it highly dangerous. The impact spans confidentiality, integrity, and availability, as attackers can fully compromise affected systems. Since these software packages are foundational components in Unix-like operating systems, their compromise can lead to widespread system control. The CVSS score is 10, indicating critical severity. Although this vulnerability dates back to 1999 and no patches are available (likely because the compromised versions are obsolete), the threat highlights the risks of supply chain attacks where trusted software distribution channels are subverted. Organizations running legacy systems with these versions remain at risk if they have not upgraded or verified software integrity.
Potential Impact
For European organizations, the impact of this threat can be severe, especially for those relying on legacy Unix/Linux systems or embedded devices using the affected software versions. Compromise of TCP Wrappers or OpenSSH can allow attackers to bypass network access controls and gain shell access, leading to full system compromise. Compromised Sendmail or wuftpd servers can be used to intercept or manipulate email and file transfer communications, potentially leaking sensitive business or personal data. The integrity of IRC clients could be undermined, affecting communication confidentiality. Given the critical nature of these components in server infrastructure, exploitation could disrupt business operations, cause data breaches, and damage organizational reputation. Additionally, the lack of patches means organizations must rely on mitigation strategies or upgrades. European organizations handling sensitive data under GDPR face regulatory risks if breaches occur due to this vulnerability. The threat is particularly relevant for sectors with legacy infrastructure such as government, research institutions, and industrial control systems.
Mitigation Recommendations
1. Immediate audit of all systems to identify any installations of the affected software versions. 2. Replace compromised versions with verified, up-to-date, and vendor-supported software releases. 3. Employ cryptographic verification of software packages using signatures or checksums from trusted sources before installation to prevent supply chain tampering. 4. Implement network segmentation and strict access controls to limit exposure of critical services like SSH, FTP, and mail servers. 5. Use intrusion detection and prevention systems to monitor for anomalous activity indicative of Trojan Horse exploitation. 6. For legacy systems that cannot be upgraded, consider isolating them from critical networks and applying compensating controls such as host-based firewalls and strict user privilege management. 7. Educate system administrators about the risks of downloading software from untrusted sources and the importance of verifying software integrity. 8. Regularly review and update incident response plans to address potential compromises stemming from supply chain attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-1999-0661: A system is running a version of software that was replaced with a Trojan Horse at one of its distri
Description
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
AI-Powered Analysis
Technical Analysis
CVE-1999-0661 describes a critical security vulnerability involving the distribution of Trojan Horse-infected versions of widely used software packages. Specifically, certain versions of software such as TCP Wrappers 7.6, util-linux 2.9g, wuarchive ftpd (wuftpd) versions 2.2 and 2.1f, IRC client ircII 2.2.9, OpenSSH 3.4p1, and Sendmail 8.12.6 were replaced at their distribution points with maliciously altered versions containing Trojan Horses. This means that users who downloaded and installed these compromised versions inadvertently introduced backdoors or malicious code into their systems. The Trojan Horse could allow attackers to gain unauthorized remote access, execute arbitrary code, exfiltrate sensitive data, or disrupt system operations. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L), making it highly dangerous. The impact spans confidentiality, integrity, and availability, as attackers can fully compromise affected systems. Since these software packages are foundational components in Unix-like operating systems, their compromise can lead to widespread system control. The CVSS score is 10, indicating critical severity. Although this vulnerability dates back to 1999 and no patches are available (likely because the compromised versions are obsolete), the threat highlights the risks of supply chain attacks where trusted software distribution channels are subverted. Organizations running legacy systems with these versions remain at risk if they have not upgraded or verified software integrity.
Potential Impact
For European organizations, the impact of this threat can be severe, especially for those relying on legacy Unix/Linux systems or embedded devices using the affected software versions. Compromise of TCP Wrappers or OpenSSH can allow attackers to bypass network access controls and gain shell access, leading to full system compromise. Compromised Sendmail or wuftpd servers can be used to intercept or manipulate email and file transfer communications, potentially leaking sensitive business or personal data. The integrity of IRC clients could be undermined, affecting communication confidentiality. Given the critical nature of these components in server infrastructure, exploitation could disrupt business operations, cause data breaches, and damage organizational reputation. Additionally, the lack of patches means organizations must rely on mitigation strategies or upgrades. European organizations handling sensitive data under GDPR face regulatory risks if breaches occur due to this vulnerability. The threat is particularly relevant for sectors with legacy infrastructure such as government, research institutions, and industrial control systems.
Mitigation Recommendations
1. Immediate audit of all systems to identify any installations of the affected software versions. 2. Replace compromised versions with verified, up-to-date, and vendor-supported software releases. 3. Employ cryptographic verification of software packages using signatures or checksums from trusted sources before installation to prevent supply chain tampering. 4. Implement network segmentation and strict access controls to limit exposure of critical services like SSH, FTP, and mail servers. 5. Use intrusion detection and prevention systems to monitor for anomalous activity indicative of Trojan Horse exploitation. 6. For legacy systems that cannot be upgraded, consider isolating them from critical networks and applying compensating controls such as host-based firewalls and strict user privilege management. 7. Educate system administrators about the risks of downloading software from untrusted sources and the importance of verifying software integrity. 8. Regularly review and update incident response plans to address potential compromises stemming from supply chain attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7ded37
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 6/28/2025, 5:42:11 PM
Last updated: 8/15/2025, 11:29:14 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-53705: CWE-787 Out-of-bounds Write in Ashlar-Vellum Cobalt
HighCVE-2025-41392: CWE-125 Out-of-bounds Read in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.