Skip to main content

CVE-1999-0720: The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other

Medium
VulnerabilityCVE-1999-0720cve-1999-0720
Published: Mon Aug 23 1999 (08/23/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users.

AI-Powered Analysis

AILast updated: 07/01/2025, 15:58:33 UTC

Technical Analysis

CVE-1999-0720 is a vulnerability in the Linux kernel affecting the pt_chown command, which allows local users to modify TTY terminal devices that belong to other users. Specifically, the pt_chown utility is intended to change ownership of pseudo-terminal (PTY) devices, but due to insufficient access controls, a local attacker can manipulate TTY device ownership improperly. This can lead to unauthorized access or control over terminal devices assigned to other users. The vulnerability affects Linux kernel version 2.6.20.1, an older kernel version released in the early 2000s. The CVSS score is 4.6 (medium severity), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability (C:P/I:P/A:P). Although no patches are available and no known exploits are reported in the wild, the vulnerability could be leveraged by a local attacker to escalate privileges or intercept terminal sessions by changing ownership of TTY devices, potentially compromising user sessions or sensitive data. Given the age of the vulnerability, modern Linux distributions have likely addressed this issue in subsequent kernel versions, but legacy systems or embedded devices running outdated kernels remain at risk.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on systems running outdated or legacy Linux kernels, particularly version 2.6.20.1 or similar. If exploited, an attacker with local access could gain unauthorized control over terminal devices of other users, enabling privilege escalation, session hijacking, or data interception. This could compromise confidentiality and integrity of user sessions and potentially lead to broader system compromise. Organizations relying on legacy Linux systems in critical infrastructure, industrial control systems, or embedded environments could face operational disruptions or data breaches. However, the requirement for local access limits remote exploitation, reducing the risk from external attackers but increasing the threat from insider threats or attackers who have already gained limited access.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Upgrade Linux kernels to supported, modern versions where this vulnerability has been fixed. 2) Audit systems to identify any running legacy kernels, especially in critical or sensitive environments. 3) Restrict local user access to trusted personnel only and enforce strict access controls and monitoring to detect unauthorized privilege escalations. 4) Implement mandatory access control (MAC) frameworks such as SELinux or AppArmor to limit the ability of local users to manipulate device ownership. 5) Regularly review and harden system configurations related to TTY device permissions. 6) For embedded or legacy systems that cannot be upgraded, consider isolating them from sensitive networks and applying compensating controls such as enhanced logging and intrusion detection to monitor suspicious local activities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df1c9

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 3:58:33 PM

Last updated: 8/13/2025, 6:47:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats