Skip to main content

CVE-1999-0714: Vulnerability in Compaq Tru64 UNIX edauth command.

Low
VulnerabilityCVE-1999-0714cve-1999-0714
Published: Mon Feb 15 1999 (02/15/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: unix

Description

Vulnerability in Compaq Tru64 UNIX edauth command.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:43:30 UTC

Technical Analysis

CVE-1999-0714 is a vulnerability identified in the edauth command of Compaq Tru64 UNIX operating systems, specifically affecting versions 3.2g and all 4.0 variants (4.0, 4.0a, 4.0b, 4.0c, 4.0d, 4.0e). The edauth command is related to authentication mechanisms within the Tru64 UNIX environment. The vulnerability is characterized by a local attack vector (AV:L), requiring low attack complexity (AC:L), and no authentication (Au:N) to exploit. The impact is limited to partial confidentiality compromise (C:P) with no impact on integrity (I:N) or availability (A:N). The CVSS score is low (2.1), reflecting the limited scope and impact of the vulnerability. No patches are available, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the obsolescence of the affected operating system, this vulnerability is primarily of historical interest. However, any legacy systems still running these versions could be susceptible to local attackers gaining partial access to confidential information through the edauth command. The lack of patches means mitigation must rely on compensating controls and system hardening.

Potential Impact

For European organizations, the impact of CVE-1999-0714 is generally low due to the rarity of Compaq Tru64 UNIX systems in modern environments. However, organizations that maintain legacy infrastructure for critical operations or archival purposes may face risks if these systems are accessible to local users or insiders. The partial confidentiality impact could lead to unauthorized disclosure of sensitive information, potentially violating data protection regulations such as GDPR if personal data is involved. Since the vulnerability does not affect integrity or availability, the risk of system disruption or data tampering is minimal. The lack of remote exploitability further reduces the threat surface, limiting exploitation to scenarios where an attacker has local access. Nonetheless, insider threats or attackers who gain physical or local access could leverage this vulnerability to escalate privileges or gather sensitive information.

Mitigation Recommendations

Given that no official patches are available for this vulnerability, European organizations should implement the following specific mitigation strategies: 1) Restrict local access to systems running affected versions of Tru64 UNIX by enforcing strict access controls and monitoring user activities. 2) Isolate legacy Tru64 UNIX systems from general network access to minimize exposure and prevent unauthorized local access. 3) Employ system hardening techniques such as disabling or restricting the use of the edauth command where possible, or replacing it with more secure authentication mechanisms. 4) Conduct regular audits and monitoring to detect unusual local activities that could indicate exploitation attempts. 5) Where feasible, plan and execute migration away from Tru64 UNIX to supported and actively maintained operating systems to eliminate exposure to this and other legacy vulnerabilities. 6) Implement strong physical security controls to prevent unauthorized physical access to affected systems.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dee27

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:43:30 PM

Last updated: 7/29/2025, 5:40:16 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats