Skip to main content

CVE-1999-0825: The default permissions for UnixWare /var/mail allow local users to read and modify other users' mai

Low
VulnerabilityCVE-1999-0825cve-1999-0825
Published: Fri Dec 03 1999 (12/03/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: unixware

Description

The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:10:51 UTC

Technical Analysis

CVE-1999-0825 is a vulnerability affecting UnixWare versions 7.0, 7.0.1, and 7.1, where the default permissions set on the /var/mail directory allow local users to read and modify other users' mail. UnixWare is a Unix operating system variant developed by SCO. The vulnerability arises because the mail spool directory (/var/mail) is configured with overly permissive access rights, enabling any local user on the system to access the mail files of other users. This can lead to unauthorized disclosure of sensitive email content (confidentiality impact) and unauthorized modification or deletion of mail (integrity impact). The CVSS v2 score is 3.6, indicating a low severity primarily because the attack vector is local (AV:L), the attack complexity is low (AC:L), no authentication is required (Au:N), and the impact affects confidentiality and integrity but not availability. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability is limited to local users, meaning an attacker must have local access to the UnixWare system to exploit it. This vulnerability reflects a misconfiguration or insecure default setting rather than a software bug or code flaw. Given the age of the vulnerability (published in 1999) and the specific product affected, it is primarily relevant to legacy UnixWare systems still in operation.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence and use of UnixWare systems within their IT infrastructure. Organizations running legacy UnixWare servers that handle email locally could face risks of internal data leakage and tampering. Unauthorized local users, including disgruntled employees or attackers who have gained limited local access, could read sensitive emails or alter them, potentially leading to information disclosure or manipulation of communication. While the vulnerability does not affect system availability, the breach of confidentiality and integrity could have compliance implications under GDPR if personal or sensitive data is exposed. The risk is mitigated by the requirement for local access, limiting remote exploitation. However, in environments where UnixWare is used for critical internal communications or legacy applications, this vulnerability could facilitate insider threats or lateral movement by attackers who have compromised a local account.

Mitigation Recommendations

Since no official patch is available, mitigation must focus on configuration and access control. Administrators should immediately review and tighten permissions on the /var/mail directory and individual mail files to restrict access strictly to the owning user and system mail services. This can be done by setting appropriate Unix file permissions (e.g., 600 or 660) and ownership to prevent unauthorized read/write access. Additionally, organizations should audit local user accounts and restrict unnecessary local access to UnixWare systems. Employing mandatory access control (MAC) mechanisms or filesystem ACLs, if supported, can further enforce strict access policies. Monitoring and logging local access to mail directories can help detect suspicious activity. Where feasible, migrating away from legacy UnixWare systems to modern, supported platforms with updated security controls is strongly recommended to reduce exposure. Finally, educating users about the risks of local access and enforcing strong local account security policies will help mitigate insider threats.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df49e

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 1:10:51 PM

Last updated: 7/21/2025, 3:38:26 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats