Skip to main content

CVE-1999-1037: rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the

High
VulnerabilityCVE-1999-1037cve-1999-1037
Published: Fri Jun 26 1998 (06/26/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: coast
Product: satan

Description

rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.

AI-Powered Analysis

AILast updated: 06/29/2025, 21:54:41 UTC

Technical Analysis

CVE-1999-1037 is a high-severity local vulnerability affecting SATAN (Security Administrator Tool for Analyzing Networks) version 1.1.1, specifically the rex.satan component. SATAN is a network security scanner developed in the mid-1990s to help administrators identify vulnerabilities in their networks. The vulnerability arises from the way rex.satan handles temporary files in the /tmp directory. It creates a temporary file named /tmp/rex.$$ (where $$ is the process ID) without securely checking for symbolic links. This allows a local attacker to perform a symlink (symbolic link) attack by creating a symbolic link with the same name pointing to an arbitrary file elsewhere on the system. When rex.satan writes to the temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to arbitrary file overwrite, compromising confidentiality, integrity, and availability of system files. The vulnerability requires local access but no authentication, and the attack complexity is low since it exploits predictable temporary file naming and lack of secure file handling. The CVSS score of 7.2 reflects the critical impact on confidentiality, integrity, and availability, combined with low attack complexity and no authentication requirement. No patch is available for this vulnerability, and no known exploits in the wild have been reported. However, the underlying issue is a classic example of insecure temporary file handling leading to privilege escalation or system compromise.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence and use of SATAN 1.1.1 within their environments. Although SATAN is an older tool and largely replaced by more modern scanners, some legacy systems or research environments might still use it. If exploited, an attacker with local access could overwrite critical system or application files, potentially leading to privilege escalation, system instability, or denial of service. This could compromise sensitive data confidentiality and integrity, disrupt business operations, and require costly incident response and recovery efforts. In environments where SATAN is used for security auditing, exploitation could undermine trust in security assessments. Given the local access requirement, the threat is more relevant in scenarios where multiple users share systems or where attackers have gained initial footholds through other means. European organizations with legacy Unix/Linux systems or research institutions might be more exposed. The lack of a patch means mitigation relies on operational controls and environment hardening.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should implement the following specific mitigations: 1) Avoid using SATAN 1.1.1; upgrade to modern, actively maintained vulnerability scanners that follow secure coding practices. 2) Restrict local user access to systems running SATAN to trusted administrators only, minimizing the risk of local exploitation. 3) Implement strict file system permissions and monitoring on /tmp to detect and prevent unauthorized creation of symbolic links or suspicious file activities. 4) Use secure temporary file creation methods (e.g., mkstemp or similar) in any custom scripts or tools to avoid predictable temporary filenames. 5) Employ mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of local users to overwrite critical files even if a symlink attack is attempted. 6) Monitor system logs and file integrity to detect any unauthorized file modifications. 7) Educate system administrators about the risks of insecure temporary file handling and encourage best practices in software usage and system hardening.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea05

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 9:54:41 PM

Last updated: 8/17/2025, 9:18:23 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats