Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0961: HPUX sysdiag allows local users to gain root privileges via a symlink attack during log file creatio

0
Medium
VulnerabilityCVE-1999-0961cve-1999-0961
Published: Sat Sep 21 1996 (09/21/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: hp
Product: hp-ux

Description

HPUX sysdiag allows local users to gain root privileges via a symlink attack during log file creation.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:41:59 UTC

Technical Analysis

CVE-1999-0961 is a local privilege escalation vulnerability affecting Hewlett-Packard's HP-UX operating system versions 9.04 and 9.05. The vulnerability arises from the sysdiag utility, which is designed for system diagnostics and troubleshooting. During the creation of log files, sysdiag improperly handles symbolic links (symlinks), allowing a local user to exploit this behavior to gain root privileges. Specifically, the attack involves creating a symlink that points to a sensitive system file or location. When sysdiag attempts to create or write to its log file, it follows the symlink and inadvertently modifies or overwrites the target file with root privileges. This symlink race condition enables an attacker with local access to escalate their privileges from a non-privileged user to root, compromising the confidentiality, integrity, and availability of the system. The vulnerability has a CVSS v2 base score of 6.2, indicating a medium severity level. The attack vector is local (AV:L), requires high attack complexity (AC:H), does not require authentication (Au:N), and impacts confidentiality, integrity, and availability (C:C/I:C/A:C). No patches are available for this vulnerability, and there are no known exploits in the wild documented. Given the age of the vulnerability (published in 1996) and the affected HP-UX versions, this issue primarily concerns legacy systems still in operation.

Potential Impact

For European organizations, the impact of CVE-1999-0961 can be significant if legacy HP-UX 9.04 or 9.05 systems are still in use, particularly in critical infrastructure, industrial control systems, or specialized enterprise environments where HP-UX remains operational. Successful exploitation allows local attackers to gain root privileges, potentially leading to full system compromise, unauthorized access to sensitive data, disruption of services, and the ability to install persistent backdoors or malware. This can result in data breaches, operational downtime, and loss of trust. Although the vulnerability requires local access and high attack complexity, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges and move laterally within the network. European organizations in sectors such as manufacturing, telecommunications, and government agencies that historically deployed HP-UX might be at higher risk. The lack of available patches means organizations must rely on compensating controls to mitigate risks.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict local access strictly to trusted personnel and enforce strong access controls and user account management to minimize the risk of unauthorized local access. 2) Monitor and audit sysdiag usage and log file creation activities to detect suspicious behavior indicative of symlink exploitation attempts. 3) Employ filesystem permissions and mount options that prevent users from creating symlinks in directories where sysdiag writes logs or restrict sysdiag’s log file creation to directories with controlled access. 4) Consider disabling or removing the sysdiag utility if it is not essential for operations, or replace it with updated diagnostic tools that do not exhibit this vulnerability. 5) Use host-based intrusion detection systems (HIDS) to monitor for unauthorized privilege escalation attempts. 6) For environments where HP-UX 9.04 or 9.05 is still critical, plan and prioritize migration to supported and patched operating system versions to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de52f

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:41:59 AM

Last updated: 2/7/2026, 6:28:11 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats