Skip to main content

CVE-1999-0730: The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink

High
VulnerabilityCVE-1999-0730cve-1999-0730
Published: Sat Jun 12 1999 (06/12/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: debian
Product: debian_linux

Description

The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack.

AI-Powered Analysis

AILast updated: 06/27/2025, 20:40:30 UTC

Technical Analysis

CVE-1999-0730 is a critical vulnerability affecting the zsoelim program included in the Debian man-db package, specifically impacting Debian Linux version 4.0. The vulnerability arises from the program's improper handling of symbolic links (symlinks), which allows a local attacker to overwrite arbitrary files on the system. The attack vector involves creating a malicious symlink that points to a target file, which zsoelim then follows and overwrites during its normal operation. Since zsoelim is typically used to process troff documents by expanding included files, the flaw can be exploited by any local user without authentication, leading to complete compromise of confidentiality, integrity, and availability of affected files. The CVSS v2 score of 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) reflects the severity: network attack vector, low complexity, no authentication required, and total impact on confidentiality, integrity, and availability. Although this vulnerability dates back to 1999 and affects an outdated Debian release, it remains a critical example of symlink race conditions and improper file handling in Unix-like systems. No patch is available for this specific version, and no known exploits have been reported in the wild, but the theoretical risk remains high for any legacy systems still running this vulnerable software.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy Debian 4.0 systems are still in use, which is unlikely in modern environments but possible in specialized or isolated industrial systems. If exploited, the vulnerability allows local attackers to overwrite critical system or application files, potentially leading to privilege escalation, system compromise, or denial of service. This could result in data breaches, operational disruption, and loss of trust. Organizations relying on legacy Debian systems for critical infrastructure or sensitive data processing could face significant confidentiality and integrity risks. Furthermore, the ease of exploitation without authentication means that any local user, including unprivileged insiders or compromised accounts, could leverage this flaw to escalate privileges or disrupt services. Given the high CVSS score and total impact on system security, organizations must assess their exposure, especially in sectors with legacy Unix/Linux deployments such as manufacturing, research, or governmental agencies.

Mitigation Recommendations

Since no official patch is available for Debian 4.0, organizations should prioritize upgrading to a supported and patched version of Debian or another Linux distribution that addresses this vulnerability. If upgrading is not immediately feasible, administrators should restrict local user access to systems running vulnerable versions, employing strict access controls and monitoring for suspicious activity. Additionally, disabling or removing the zsoelim program where it is not required can mitigate risk. Implementing file integrity monitoring to detect unauthorized changes and employing mandatory access controls (e.g., AppArmor or SELinux) to limit the ability of processes to follow or create symlinks can also reduce exploitation potential. Regular auditing of file permissions and symlink usage, combined with user education about the risks of local privilege escalation, will further strengthen defenses. Finally, organizations should consider network segmentation to isolate legacy systems and reduce the risk of lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df07e

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 8:40:30 PM

Last updated: 7/26/2025, 5:40:34 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats