Skip to main content

CVE-1999-0850: The default permissions for Endymion MailMan allow local users to read email or modify files.

Low
VulnerabilityCVE-1999-0850cve-1999-0850
Published: Thu Dec 02 1999 (12/02/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: endymion
Product: mailman_webmail

Description

The default permissions for Endymion MailMan allow local users to read email or modify files.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:11:53 UTC

Technical Analysis

CVE-1999-0850 is a vulnerability identified in the Endymion MailMan Webmail product, specifically version 3.0.18. The issue arises from the default file permissions configured for the MailMan application, which allow local users on the affected system to read email contents or modify files associated with the application. This vulnerability is due to overly permissive access controls on files that should be restricted, enabling any local user without authentication to access sensitive email data or alter files. The vulnerability does not require network access or remote exploitation since it is limited to local users, and no authentication is needed to exploit the permissions misconfiguration. The CVSS score assigned is 3.6 (low severity), reflecting limited impact and exploitability. The vector indicates local access (AV:L), low attack complexity (AC:L), no authentication required (Au:N), partial confidentiality and integrity impact (C:P/I:P), and no impact on availability (A:N). No patches or fixes are available, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specific version affected, this issue primarily concerns legacy systems still running Endymion MailMan 3.0.18 or similar configurations with default permissions intact.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to insider threat scenarios or compromised local accounts. If an attacker or unauthorized user gains local access to a system running the vulnerable MailMan version, they could read sensitive email communications or modify files, potentially leading to data leakage, unauthorized data manipulation, or disruption of email services. While the vulnerability does not allow remote exploitation, organizations with shared or multi-user environments, such as universities, research institutions, or companies with legacy mail systems, could be at risk. The confidentiality and integrity of email data could be compromised, which may affect compliance with European data protection regulations such as GDPR if personal or sensitive data is exposed. However, the overall risk is mitigated by the requirement for local access and the low severity rating. The lack of available patches means organizations must rely on compensating controls or system upgrades to mitigate risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any systems running Endymion MailMan version 3.0.18 or similar legacy versions. Since no official patches are available, the best approach is to upgrade to a more recent, supported webmail solution with secure default permissions. If upgrading is not immediately feasible, organizations should manually audit and tighten file system permissions related to the MailMan installation, ensuring that only authorized service accounts and administrators have read/write access to email files. Implement strict access controls and monitoring on systems hosting MailMan to detect and prevent unauthorized local access. Additionally, organizations should enforce strong user account management policies, including limiting local user accounts and employing endpoint security solutions to detect suspicious activity. Regular security audits and user training on the risks of local access vulnerabilities can further reduce exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df494

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 1:11:53 PM

Last updated: 7/26/2025, 11:52:47 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats