Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0836: UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.

0
High
VulnerabilityCVE-1999-0836cve-1999-0836
Published: Wed Dec 02 1998 (12/02/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: unixware

Description

UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.

AI-Powered Analysis

AILast updated: 06/29/2025, 10:26:08 UTC

Technical Analysis

CVE-1999-0836 is a critical vulnerability affecting the UnixWare operating system versions 7.0, 7.0.1, 7.1, and 7.1.1, specifically related to the 'uidadmin' utility. This vulnerability arises from the improper handling of symbolic links (symlinks) by the uidadmin program, which allows local users to perform a symlink attack. In such an attack, a malicious user creates a symbolic link pointing to an arbitrary file and tricks the uidadmin utility into modifying that file. Because uidadmin runs with elevated privileges, this can lead to unauthorized modification of arbitrary files on the system. The vulnerability does not require authentication or remote access, but it does require local access to the system. The CVSS score of 10 (critical) reflects the high impact on confidentiality, integrity, and availability, as an attacker can fully compromise system files, potentially leading to privilege escalation, data corruption, or denial of service. No patches are available for this vulnerability, and there are no known exploits in the wild, likely due to the age of the affected systems and their limited deployment today. However, the vulnerability remains a significant risk for legacy UnixWare systems still in operation.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether UnixWare systems are still in use within their infrastructure. Organizations relying on legacy UnixWare servers for critical operations could face severe consequences, including unauthorized file modifications, privilege escalation, and potential full system compromise. This could lead to data breaches, disruption of business processes, and loss of trust. Given the vulnerability allows local users to gain elevated control without authentication, insider threats or attackers who gain initial local access could exploit this flaw to escalate privileges and move laterally within networks. In sectors such as finance, government, and critical infrastructure where legacy Unix systems might still be operational, the risk is particularly acute. Additionally, the absence of patches means organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

Since no official patches are available, European organizations should implement strict access controls to limit local user access to UnixWare systems. This includes disabling or restricting the use of the uidadmin utility to trusted administrators only. Employing file system monitoring to detect unauthorized symlink creation or suspicious file modifications can help identify exploitation attempts. Organizations should consider isolating legacy UnixWare systems from critical network segments and applying network-level controls to prevent unauthorized access. If feasible, migrating from UnixWare to a supported and actively maintained operating system is strongly recommended to eliminate exposure to this and other legacy vulnerabilities. Additionally, implementing host-based intrusion detection systems (HIDS) and conducting regular security audits can help detect and prevent exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deb66

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 10:26:08 AM

Last updated: 2/7/2026, 6:54:03 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats