Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0782: KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmenta

0
Low
VulnerabilityCVE-1999-0782cve-1999-0782
Published: Wed Nov 18 1998 (11/18/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:26:22 UTC

Technical Analysis

CVE-1999-0782 is a vulnerability found in the KDE kppp dial-up networking application, specifically affecting FreeBSD versions 6.2, 1.0, and Linux kernel 2.6.20.1. The issue arises because kppp improperly handles the HOME environment variable, allowing a local user to manipulate this variable to cause the creation of a directory at an arbitrary location in the filesystem. This vulnerability is local, meaning an attacker must have access to the system to exploit it. The flaw does not require authentication beyond local access and does not impact confidentiality or availability directly but can affect integrity by allowing unauthorized directory creation. The CVSS score of 2.1 (low severity) reflects the limited impact and the requirement for local access. There is no patch available, and no known exploits have been reported in the wild. The vulnerability dates back to 1998 and primarily affects older versions of FreeBSD and Linux kernels, which are largely obsolete today. The root cause is the insufficient sanitization or validation of the HOME environment variable before using it to create directories, which can be leveraged to place directories in unintended filesystem locations, potentially facilitating further privilege escalation or persistence mechanisms if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations, the direct impact of this vulnerability is minimal today due to the age of the affected software versions and the low severity rating. However, organizations still running legacy FreeBSD or Linux systems with these specific versions could be at risk. The ability for a local user to create directories arbitrarily could be leveraged to bypass certain security controls or prepare the system for further attacks, especially in multi-user environments or shared hosting scenarios. While confidentiality and availability are not directly compromised, integrity could be affected if malicious directories interfere with system operations or security policies. Given the lack of patches and the absence of known exploits, the practical risk is low, but it highlights the importance of maintaining updated systems and restricting local user privileges.

Mitigation Recommendations

Since no official patch is available, European organizations should focus on mitigating this vulnerability through operational controls. First, ensure that all systems are upgraded to supported and patched versions of FreeBSD and Linux kernels, eliminating exposure to this and other legacy vulnerabilities. For systems that must run legacy software, restrict local user access strictly and implement mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized directory creation outside designated areas. Additionally, monitor filesystem changes for unusual directory creation activities, especially in sensitive locations. Employ environment variable sanitization in custom scripts or wrappers around kppp if it must be used, ensuring the HOME variable cannot be manipulated by untrusted users. Finally, conduct regular audits of user permissions and environment configurations to detect and remediate potential misuse.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deb3d

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:26:22 PM

Last updated: 2/7/2026, 7:15:49 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats