CVE-1999-0957: MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
AI Analysis
Technical Summary
CVE-1999-0957 is a vulnerability found in the MajorCool mj_key_cache program, which is a software component developed by Great Circle Associates. The vulnerability allows local users to perform a symlink (symbolic link) attack to modify arbitrary files on the system. Specifically, the mj_key_cache program does not properly handle file operations when dealing with symbolic links, enabling an attacker with local access to create a symlink pointing to a target file. When the vulnerable program writes to or modifies the symlinked file, the attacker can alter files they normally would not have permission to change. This type of attack compromises the integrity of files without requiring elevated privileges or authentication. The vulnerability was published in 1997 and has a CVSS score of 2.1, indicating a low severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), no impact on confidentiality (C:N), partial impact on integrity (I:P), and no impact on availability (A:N). There are no patches available, and no known exploits in the wild have been reported. The vulnerability primarily affects systems running the MajorCool mj_key_cache program, which is an older and less commonly used software component today.
Potential Impact
For European organizations, the direct impact of this vulnerability is limited due to the age and obscurity of the affected software. However, if any legacy systems or specialized environments still run the MajorCool mj_key_cache program, local attackers could exploit this vulnerability to modify critical configuration or data files, potentially leading to unauthorized changes in system behavior or data corruption. Since the attack requires local access, the threat is primarily from insider threats or attackers who have already gained limited access to the network or system. The integrity compromise could undermine trust in system operations or lead to further privilege escalation if combined with other vulnerabilities. Given the low CVSS score and lack of known exploits, the immediate risk to European organizations is low, but organizations with legacy systems should be cautious.
Mitigation Recommendations
1. Identify and inventory any systems running the MajorCool mj_key_cache program, especially legacy or specialized environments. 2. Restrict local access to trusted users only, employing strict access controls and monitoring for suspicious activity. 3. Where possible, replace or upgrade legacy software components with modern, supported alternatives that do not have known vulnerabilities. 4. Implement file system permissions and integrity monitoring to detect unauthorized file modifications, particularly in directories used by mj_key_cache. 5. Use security best practices such as disabling unnecessary local accounts, enforcing least privilege, and employing endpoint detection and response (EDR) tools to detect potential symlink attacks or unusual file system activity. 6. Since no patches are available, consider isolating affected systems or running them in sandboxed environments to limit potential damage.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-1999-0957: MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
Description
MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
AI-Powered Analysis
Technical Analysis
CVE-1999-0957 is a vulnerability found in the MajorCool mj_key_cache program, which is a software component developed by Great Circle Associates. The vulnerability allows local users to perform a symlink (symbolic link) attack to modify arbitrary files on the system. Specifically, the mj_key_cache program does not properly handle file operations when dealing with symbolic links, enabling an attacker with local access to create a symlink pointing to a target file. When the vulnerable program writes to or modifies the symlinked file, the attacker can alter files they normally would not have permission to change. This type of attack compromises the integrity of files without requiring elevated privileges or authentication. The vulnerability was published in 1997 and has a CVSS score of 2.1, indicating a low severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), no impact on confidentiality (C:N), partial impact on integrity (I:P), and no impact on availability (A:N). There are no patches available, and no known exploits in the wild have been reported. The vulnerability primarily affects systems running the MajorCool mj_key_cache program, which is an older and less commonly used software component today.
Potential Impact
For European organizations, the direct impact of this vulnerability is limited due to the age and obscurity of the affected software. However, if any legacy systems or specialized environments still run the MajorCool mj_key_cache program, local attackers could exploit this vulnerability to modify critical configuration or data files, potentially leading to unauthorized changes in system behavior or data corruption. Since the attack requires local access, the threat is primarily from insider threats or attackers who have already gained limited access to the network or system. The integrity compromise could undermine trust in system operations or lead to further privilege escalation if combined with other vulnerabilities. Given the low CVSS score and lack of known exploits, the immediate risk to European organizations is low, but organizations with legacy systems should be cautious.
Mitigation Recommendations
1. Identify and inventory any systems running the MajorCool mj_key_cache program, especially legacy or specialized environments. 2. Restrict local access to trusted users only, employing strict access controls and monitoring for suspicious activity. 3. Where possible, replace or upgrade legacy software components with modern, supported alternatives that do not have known vulnerabilities. 4. Implement file system permissions and integrity monitoring to detect unauthorized file modifications, particularly in directories used by mj_key_cache. 5. Use security best practices such as disabling unnecessary local accounts, enforcing least privilege, and employing endpoint detection and response (EDR) tools to detect potential symlink attacks or unusual file system activity. 6. Since no patches are available, consider isolating affected systems or running them in sandboxed environments to limit potential damage.
Affected Countries
Threat ID: 682ca32ab6fd31d6ed7de706
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/1/2025, 11:54:43 PM
Last updated: 2/7/2026, 6:33:38 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.