CVE-1999-0862: Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privile
Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file.
AI Analysis
Technical Summary
CVE-1999-0862 is a vulnerability identified in older RPM distributions of PostgreSQL versions 6.3.2, 6.5.3, and 6.5.3.1. The issue arises from insecure directory permissions that allow local users on the affected system to read a plaintext password file. This exposure enables unauthorized privilege escalation by granting access to sensitive authentication credentials. The vulnerability is local in nature, requiring the attacker to have access to the system already, but no authentication is needed to exploit the flaw once local access is obtained. The CVSS score of 2.1 reflects the low severity, primarily because the attack vector is local and the impact is limited to confidentiality loss without affecting integrity or availability. The vulnerability does not have a patch available, likely due to the age of the affected PostgreSQL versions, which are now obsolete and unsupported. The core technical issue is improper file system permissions on directories or files containing PostgreSQL password data, which should have been restricted to privileged users only. This misconfiguration allows any local user to read sensitive password information in plaintext, potentially leading to unauthorized database access and privilege escalation within the system.
Potential Impact
For European organizations, the impact of this vulnerability is generally low given the age of the affected PostgreSQL versions and the requirement for local system access. However, if legacy systems running these outdated PostgreSQL versions are still in use, the exposure of plaintext passwords could lead to unauthorized access to critical databases, potentially compromising sensitive business data. This could result in data confidentiality breaches, unauthorized data manipulation, or lateral movement within the network if attackers leverage the gained privileges. The vulnerability does not affect system availability or data integrity directly but poses a risk to confidentiality. Organizations relying on PostgreSQL for critical applications should be aware that any legacy installations with insecure directory permissions could be exploited by malicious insiders or attackers who have gained initial local access through other means. The risk is compounded in environments where local user accounts are shared or poorly controlled, increasing the likelihood of exploitation.
Mitigation Recommendations
Given the absence of an official patch for these legacy PostgreSQL versions, European organizations should prioritize upgrading to supported, modern PostgreSQL releases that follow current security best practices for file permissions and credential storage. In the interim, organizations should audit and correct file system permissions on PostgreSQL directories and password files to ensure that only the PostgreSQL service account and system administrators have read access. Implement strict access controls and monitoring on systems running PostgreSQL to detect unauthorized local access attempts. Employ host-based intrusion detection systems (HIDS) to alert on suspicious file access patterns. Additionally, organizations should enforce strong local user account management policies, including minimizing the number of users with local access and using role-based access controls. If legacy systems cannot be upgraded immediately, consider isolating them within segmented network zones to limit potential lateral movement. Finally, ensure that PostgreSQL passwords are rotated regularly and consider using more secure authentication methods that do not rely on plaintext password files.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-1999-0862: Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privile
Description
Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file.
AI-Powered Analysis
Technical Analysis
CVE-1999-0862 is a vulnerability identified in older RPM distributions of PostgreSQL versions 6.3.2, 6.5.3, and 6.5.3.1. The issue arises from insecure directory permissions that allow local users on the affected system to read a plaintext password file. This exposure enables unauthorized privilege escalation by granting access to sensitive authentication credentials. The vulnerability is local in nature, requiring the attacker to have access to the system already, but no authentication is needed to exploit the flaw once local access is obtained. The CVSS score of 2.1 reflects the low severity, primarily because the attack vector is local and the impact is limited to confidentiality loss without affecting integrity or availability. The vulnerability does not have a patch available, likely due to the age of the affected PostgreSQL versions, which are now obsolete and unsupported. The core technical issue is improper file system permissions on directories or files containing PostgreSQL password data, which should have been restricted to privileged users only. This misconfiguration allows any local user to read sensitive password information in plaintext, potentially leading to unauthorized database access and privilege escalation within the system.
Potential Impact
For European organizations, the impact of this vulnerability is generally low given the age of the affected PostgreSQL versions and the requirement for local system access. However, if legacy systems running these outdated PostgreSQL versions are still in use, the exposure of plaintext passwords could lead to unauthorized access to critical databases, potentially compromising sensitive business data. This could result in data confidentiality breaches, unauthorized data manipulation, or lateral movement within the network if attackers leverage the gained privileges. The vulnerability does not affect system availability or data integrity directly but poses a risk to confidentiality. Organizations relying on PostgreSQL for critical applications should be aware that any legacy installations with insecure directory permissions could be exploited by malicious insiders or attackers who have gained initial local access through other means. The risk is compounded in environments where local user accounts are shared or poorly controlled, increasing the likelihood of exploitation.
Mitigation Recommendations
Given the absence of an official patch for these legacy PostgreSQL versions, European organizations should prioritize upgrading to supported, modern PostgreSQL releases that follow current security best practices for file permissions and credential storage. In the interim, organizations should audit and correct file system permissions on PostgreSQL directories and password files to ensure that only the PostgreSQL service account and system administrators have read access. Implement strict access controls and monitoring on systems running PostgreSQL to detect unauthorized local access attempts. Employ host-based intrusion detection systems (HIDS) to alert on suspicious file access patterns. Additionally, organizations should enforce strong local user account management policies, including minimizing the number of users with local access and using role-based access controls. If legacy systems cannot be upgraded immediately, consider isolating them within segmented network zones to limit potential lateral movement. Finally, ensure that PostgreSQL passwords are rotated regularly and consider using more secure authentication methods that do not rely on plaintext password files.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7df49a
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 1:11:15 PM
Last updated: 2/7/2026, 10:45:47 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.