Skip to main content

CVE-1999-0963: FreeBSD mount_union command allows local users to gain root privileges via a symlink attack.

High
VulnerabilityCVE-1999-0963cve-1999-0963
Published: Wed Dec 01 1999 (12/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

FreeBSD mount_union command allows local users to gain root privileges via a symlink attack.

AI-Powered Analysis

AILast updated: 06/25/2025, 19:27:37 UTC

Technical Analysis

CVE-1999-0963 is a high-severity local privilege escalation vulnerability affecting FreeBSD version 2.2. The vulnerability arises from the mount_union command, which allows local users to gain root privileges by exploiting a symbolic link (symlink) attack. Specifically, the mount_union command does not properly handle symlinks when mounting union filesystems, enabling an attacker with local access to manipulate filesystem links and escalate their privileges to root. This vulnerability impacts the confidentiality, integrity, and availability of the affected system, as an attacker can gain full administrative control. The attack vector is local (AV:L), requires low attack complexity (AC:L), and does not require authentication (Au:N). The vulnerability affects a very old version of FreeBSD (2.2), which was released in the late 1990s, and no patch is available. Although no known exploits are reported in the wild, the vulnerability is significant due to the potential for complete system compromise by any local user. The CVSS v2 base score is 7.2, reflecting the critical nature of the impact and ease of exploitation once local access is obtained.

Potential Impact

For European organizations still running legacy FreeBSD 2.2 systems, this vulnerability poses a critical risk. An attacker with local access—such as an insider threat, a compromised user account, or an attacker who gains physical or remote shell access—could escalate privileges to root, leading to full system compromise. This could result in unauthorized access to sensitive data, disruption of services, and potential use of the compromised system as a pivot point for further attacks within the network. Given the age of the affected version, it is unlikely to be present in modern production environments; however, legacy systems in industrial control, research, or archival environments might still be vulnerable. The lack of a patch and the high severity score underscore the importance of mitigating this risk. The vulnerability could also impact availability if attackers modify or delete critical system files after gaining root access.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should prioritize the following mitigations: 1) Upgrade or migrate from FreeBSD 2.2 to a supported and actively maintained FreeBSD version where this vulnerability is fixed. 2) Restrict local access strictly by enforcing strong physical security controls and limiting shell access to trusted users only. 3) Implement strict filesystem permissions and monitor for suspicious symlink creation or modification activities, using filesystem integrity monitoring tools. 4) Employ mandatory access controls (MAC) or sandboxing mechanisms to limit the impact of potential local exploits. 5) Conduct regular audits of legacy systems and remove or isolate any systems running outdated FreeBSD versions. 6) Use intrusion detection systems (IDS) to monitor for unusual local activity indicative of privilege escalation attempts. These steps go beyond generic advice by focusing on legacy system management and local access restrictions specific to this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df481

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/25/2025, 7:27:37 PM

Last updated: 7/30/2025, 4:06:04 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats