Skip to main content

CVE-1999-1209: Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local use

High
VulnerabilityCVE-1999-1209cve-1999-1209
Published: Thu Nov 20 1997 (11/20/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: open_desktop

Description

Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:56:00 UTC

Technical Analysis

CVE-1999-1209 is a high-severity local privilege escalation vulnerability affecting the 'scoterm' component in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0. The vulnerability allows a local user to gain root privileges on the affected systems. Specifically, the flaw exists in the way 'scoterm' handles certain operations, enabling an unprivileged user to escalate their privileges to the highest level (root). The Common Vulnerability Scoring System (CVSS) base score is 7.2, indicating a high impact with low attack complexity and no authentication required. The vector AV:L (attack vector: local) means exploitation requires local access to the system, but once accessed, the attacker can fully compromise confidentiality, integrity, and availability of the system. This vulnerability dates back to 1997 and affects legacy SCO Unix operating systems, which are largely obsolete today. No patches are available, and there are no known exploits in the wild. However, the vulnerability remains a critical risk for any legacy systems still in operation, as it allows complete system takeover by any local user without authentication or user interaction.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy SCO OpenServer or Open Desktop systems, which are uncommon but may exist in niche industrial, manufacturing, or legacy IT environments. Successful exploitation would allow an attacker with local access to gain root privileges, leading to full system compromise. This could result in unauthorized data access, system manipulation, disruption of critical services, and potential pivoting to other networked systems. Given the age of the vulnerability and the lack of patches, affected systems represent a significant security liability. In environments where legacy SCO systems are integrated with modern infrastructure, this vulnerability could serve as a foothold for broader attacks, potentially impacting confidentiality, integrity, and availability of organizational data and services.

Mitigation Recommendations

Since no official patches are available for this vulnerability, organizations should prioritize the following mitigations: 1) Identify and inventory all SCO OpenServer 5.0 and Open Desktop/Open Server 3.0 systems in the environment. 2) Isolate these legacy systems from critical networks and limit local access strictly to trusted administrators. 3) Implement strict access controls and monitoring on these systems to detect any unauthorized local access attempts. 4) Where possible, migrate or upgrade legacy SCO systems to modern, supported operating systems that receive security updates. 5) Employ host-based intrusion detection systems (HIDS) to monitor for suspicious activities indicative of privilege escalation attempts. 6) Enforce strong physical security controls to prevent unauthorized physical access to affected machines. 7) Educate administrators and users about the risks of local access on legacy systems and enforce the principle of least privilege.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de865

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:56:00 AM

Last updated: 8/1/2025, 7:30:14 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats