CVE-1999-1173: Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions
Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions, which allows local users to (1) modify Word Perfect behavior by modifying files in the working directory, or (2) modify files of other users via a symlink attack.
AI Analysis
Technical Summary
CVE-1999-1173 is a vulnerability found in Corel Word Perfect 8 for Linux, where the application creates a temporary working directory with world-writable permissions. This misconfiguration allows any local user on the system to write to this directory. Consequently, an attacker with local access can exploit this by either modifying files within the working directory to alter the behavior of Word Perfect or by leveraging symbolic link (symlink) attacks to modify files owned by other users. The vulnerability arises from improper permission settings on temporary directories, which should ideally be restricted to prevent unauthorized access or modification. Since the vulnerability requires local access and does not involve network vectors, it is limited to users who already have some level of access to the system. The CVSS score of 2.1 (low severity) reflects that the impact is primarily on integrity (modification of files) without affecting confidentiality or availability, and no authentication is required beyond local access. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the software (published in 1998) and the specific environment (Linux systems running Corel Word Perfect 8), this vulnerability is largely of historical interest but could still pose risks in legacy systems that remain in use.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to several factors: the affected product is an outdated version of Corel Word Perfect for Linux, which is unlikely to be widely used in modern enterprise environments. However, in niche or legacy environments where this software is still operational, the vulnerability could allow local users to escalate privileges indirectly by modifying application behavior or other users' files, potentially leading to unauthorized data modification or disruption of workflows. This could be particularly relevant in shared or multi-user systems where strict user separation is critical. The risk is confined to local users, so remote attackers cannot exploit this vulnerability directly. The integrity of data and application behavior could be compromised, but confidentiality and availability are not directly impacted. Overall, the threat to European organizations is minimal unless legacy systems with this specific software are still in use without adequate local user controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first assess whether Corel Word Perfect 8 for Linux is in use within their environment. If so, consider the following specific actions: 1) Restrict local user access to systems running this software to trusted personnel only, minimizing the risk of local exploitation. 2) Implement strict file system permissions and use access control mechanisms (such as SELinux or AppArmor) to limit write permissions on temporary directories created by the application. 3) If possible, replace or upgrade the software to a more modern word processing solution that receives security updates and follows best practices for file permissions. 4) Regularly audit file and directory permissions on systems to detect and correct world-writable directories. 5) Employ monitoring to detect unusual file modifications or symlink creations in temporary directories associated with Word Perfect. Since no patch is available, these compensating controls are essential to reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-1999-1173: Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions
Description
Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions, which allows local users to (1) modify Word Perfect behavior by modifying files in the working directory, or (2) modify files of other users via a symlink attack.
AI-Powered Analysis
Technical Analysis
CVE-1999-1173 is a vulnerability found in Corel Word Perfect 8 for Linux, where the application creates a temporary working directory with world-writable permissions. This misconfiguration allows any local user on the system to write to this directory. Consequently, an attacker with local access can exploit this by either modifying files within the working directory to alter the behavior of Word Perfect or by leveraging symbolic link (symlink) attacks to modify files owned by other users. The vulnerability arises from improper permission settings on temporary directories, which should ideally be restricted to prevent unauthorized access or modification. Since the vulnerability requires local access and does not involve network vectors, it is limited to users who already have some level of access to the system. The CVSS score of 2.1 (low severity) reflects that the impact is primarily on integrity (modification of files) without affecting confidentiality or availability, and no authentication is required beyond local access. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the software (published in 1998) and the specific environment (Linux systems running Corel Word Perfect 8), this vulnerability is largely of historical interest but could still pose risks in legacy systems that remain in use.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to several factors: the affected product is an outdated version of Corel Word Perfect for Linux, which is unlikely to be widely used in modern enterprise environments. However, in niche or legacy environments where this software is still operational, the vulnerability could allow local users to escalate privileges indirectly by modifying application behavior or other users' files, potentially leading to unauthorized data modification or disruption of workflows. This could be particularly relevant in shared or multi-user systems where strict user separation is critical. The risk is confined to local users, so remote attackers cannot exploit this vulnerability directly. The integrity of data and application behavior could be compromised, but confidentiality and availability are not directly impacted. Overall, the threat to European organizations is minimal unless legacy systems with this specific software are still in use without adequate local user controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first assess whether Corel Word Perfect 8 for Linux is in use within their environment. If so, consider the following specific actions: 1) Restrict local user access to systems running this software to trusted personnel only, minimizing the risk of local exploitation. 2) Implement strict file system permissions and use access control mechanisms (such as SELinux or AppArmor) to limit write permissions on temporary directories created by the application. 3) If possible, replace or upgrade the software to a more modern word processing solution that receives security updates and follows best practices for file permissions. 4) Regularly audit file and directory permissions on systems to detect and correct world-writable directories. 5) Employ monitoring to detect unusual file modifications or symlink creations in temporary directories associated with Word Perfect. Since no patch is available, these compensating controls are essential to reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7deb85
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 9:24:35 PM
Last updated: 8/19/2025, 8:26:31 AM
Views: 16
Related Threats
CVE-2025-8448: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Schneider Eelctric EcoStruxureTM Building Operation Enterprise Server
LowCVE-2025-2988: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM Sterling B2B Integrator
LowCVE-2025-43733: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-54234: Server-Side Request Forgery (SSRF) (CWE-918) in Adobe ColdFusion
LowCVE-2025-3639: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Liferay Portal
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.