Skip to main content

CVE-1999-1146: Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users

High
VulnerabilityCVE-1999-1146cve-1999-1146
Published: Wed May 04 1994 (05/04/1994, 04:00:00 UTC)
Source: NVD
Vendor/Project: hp
Product: hp-ux

Description

Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:09:31 UTC

Technical Analysis

CVE-1999-1146 is a high-severity vulnerability identified in the Glance and gpm programs within GlancePlus for HP-UX version 9.x and earlier, specifically affecting version 8. This vulnerability allows local users to access arbitrary files and escalate their privileges on the affected system. The flaw arises from improper access control mechanisms in these monitoring tools, which are designed to provide system performance and process information. Because these programs run with elevated privileges or have access to sensitive system resources, exploitation by a local attacker can lead to unauthorized disclosure of confidential information, modification of critical files, and potentially full system compromise. The CVSS score of 7.2 reflects the significant impact on confidentiality, integrity, and availability, with low attack complexity and no authentication required, but limited to local access. Although this vulnerability was published in 1994 and no patches are available, it remains relevant for legacy HP-UX 8 systems still in operation. No known exploits are currently reported in the wild, but the risk persists due to the nature of privilege escalation and arbitrary file access.

Potential Impact

For European organizations still operating legacy HP-UX 8 systems with GlancePlus installed, this vulnerability poses a serious risk. Successful exploitation could allow malicious insiders or attackers with local access to gain elevated privileges, leading to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. Given the high confidentiality, integrity, and availability impact, organizations in sectors such as finance, government, telecommunications, and critical infrastructure could face severe operational and reputational damage. The lack of available patches increases the risk, as organizations must rely on compensating controls. Although the affected platform is relatively old, some European enterprises and government agencies may still use HP-UX systems for legacy applications, making this vulnerability relevant in those contexts.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should implement strict access controls to limit local user access to HP-UX 8 systems running GlancePlus. This includes enforcing the principle of least privilege, restricting shell access, and monitoring user activities closely. Employing host-based intrusion detection systems (HIDS) to detect anomalous behavior related to Glance or gpm processes can help identify exploitation attempts. Additionally, organizations should consider isolating legacy HP-UX systems from critical network segments and sensitive data repositories to reduce the attack surface. Where feasible, migrating legacy applications to supported platforms or upgrading to newer HP-UX versions without this vulnerability is strongly recommended. Regular security audits and user account reviews will further reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de41e

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 5:09:31 PM

Last updated: 7/26/2025, 11:57:06 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats