Skip to main content

CVE-1999-0902: ypserv allows local administrators to modify password tables.

High
VulnerabilityCVE-1999-0902cve-1999-0902
Published: Sat Oct 23 1999 (10/23/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: linux-nis
Product: ypserv

Description

ypserv allows local administrators to modify password tables.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:14:36 UTC

Technical Analysis

CVE-1999-0902 is a high-severity vulnerability affecting ypserv, the server component of the Network Information Service (NIS) used primarily on Unix and Linux systems for centralized management of user and password information. The vulnerability allows local administrators to modify password tables, which are critical for authentication and user account management. Specifically, ypserv does not properly restrict modifications to these tables, enabling a local administrator with access to the system to alter password data. This can lead to unauthorized privilege escalation, account compromise, or denial of service by corrupting authentication data. The vulnerability has a CVSS score of 7.2, reflecting its significant impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), and complete compromise of confidentiality, integrity, and availability (C:C/I:C/A:C). Although this vulnerability is relatively old (published in 1999) and no known exploits are currently reported in the wild, systems still running ypserv without mitigation remain at risk. No patches are available, which suggests that affected systems should consider alternative mitigations or migration away from ypserv. This vulnerability primarily affects environments where ypserv is deployed and local administrative access is possible, emphasizing the importance of strict local access controls and monitoring.

Potential Impact

For European organizations, the impact of CVE-1999-0902 can be significant in environments that still rely on legacy Unix/Linux systems using NIS for centralized authentication. Unauthorized modification of password tables can lead to full system compromise, allowing attackers to escalate privileges, create backdoors, or disrupt authentication services. This can result in data breaches, operational downtime, and loss of trust. Critical infrastructure, government agencies, and enterprises with legacy systems are particularly at risk. Given the local attack vector, the threat is most severe in environments where local administrative access is not tightly controlled or where insider threats exist. The lack of available patches means organizations must rely on compensating controls, increasing operational complexity. Additionally, disruption of authentication services can affect availability of critical applications and services, impacting business continuity.

Mitigation Recommendations

1. Restrict local administrative access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of unauthorized modifications. 2. Monitor and audit all local administrative activities on systems running ypserv to detect suspicious modifications to password tables. 3. Where possible, migrate away from NIS/ypserv to more modern and secure directory services such as LDAP or Active Directory, which offer better security controls and patch support. 4. Implement host-based intrusion detection systems (HIDS) to alert on unauthorized changes to critical files, including password tables. 5. Use file integrity monitoring tools to detect unauthorized modifications to NIS password files. 6. Harden system configurations by disabling unnecessary services and applying strict access controls on NIS-related files and directories. 7. Regularly review and update local user accounts and permissions to ensure no excessive privileges are granted. 8. If migration is not immediately feasible, consider isolating legacy systems from critical networks and applying network segmentation to limit potential damage.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df32a

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 1:14:36 PM

Last updated: 8/15/2025, 2:12:12 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats