Skip to main content

CVE-1999-0743: Trn allows local users to overwrite other users' files via symlinks.

Low
VulnerabilityCVE-1999-0743cve-1999-0743
Published: Fri Aug 20 1999 (08/20/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: debian
Product: debian_linux

Description

Trn allows local users to overwrite other users' files via symlinks.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:11:30 UTC

Technical Analysis

CVE-1999-0743 is a vulnerability found in the 'trn' program on Debian Linux version 4.0. The issue arises because local users can exploit symbolic link (symlink) handling flaws in the application to overwrite files owned by other users on the same system. Specifically, 'trn' does not properly validate or restrict the creation or following of symlinks, allowing an attacker with local access to create a symlink pointing to a target file owned by another user. When 'trn' writes to this symlink, it inadvertently overwrites the target file, potentially leading to unauthorized modification of files. This vulnerability requires local access, does not require authentication, and does not impact confidentiality or availability but does impact integrity. The CVSS score of 2.1 (low severity) reflects that the attack vector is local, the attack complexity is low, no authentication is required, and the impact is limited to integrity. There are no known exploits in the wild, and no patches are currently available for this specific vulnerability. Given the age of the vulnerability (published in 1999) and the affected product version (Debian 4.0), this issue is primarily relevant to legacy systems still running outdated software versions.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to its requirement for local access and the limited scope of impact (integrity only). However, in environments where Debian 4.0 or similarly vulnerable versions of 'trn' are still in use—such as legacy industrial control systems, research environments, or archival systems—this vulnerability could allow a malicious insider or an attacker who has gained local access to modify files belonging to other users. This could lead to unauthorized changes in configuration files, scripts, or data, potentially disrupting operations or enabling further privilege escalation. The risk is mitigated in modern environments by updated software and hardened access controls, but organizations with legacy systems should be aware of the threat. Since no patches are available, mitigating this vulnerability requires alternative controls such as restricting local user access and monitoring file integrity.

Mitigation Recommendations

1. Upgrade or replace legacy systems running Debian 4.0 or similarly vulnerable versions of 'trn' with supported and updated operating systems and software versions that have addressed this vulnerability. 2. Restrict local user access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of exploitation. 3. Implement file integrity monitoring solutions to detect unauthorized modifications to critical files, especially those that could be targeted via symlink attacks. 4. Use mandatory access control (MAC) frameworks such as AppArmor or SELinux to restrict the ability of processes like 'trn' to follow or create symlinks that could lead to file overwrites. 5. Conduct regular audits of user permissions and symlink usage on critical systems to identify and remediate potential abuse. 6. If upgrading is not immediately feasible, consider disabling or removing the 'trn' utility where it is not essential to reduce the attack surface.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df1aa

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:11:30 PM

Last updated: 8/10/2025, 3:31:50 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats