Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1210: xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a

0
High
VulnerabilityCVE-1999-1210cve-1999-1210
Published: Wed Nov 12 1997 (11/12/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: unix

Description

xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:56:13 UTC

Technical Analysis

CVE-1999-1210 is a high-severity local privilege vulnerability affecting the xterm terminal emulator on Digital UNIX 4.0B systems with patch kit 5. The vulnerability arises from the way xterm handles core dump files when invoked with a DISPLAY environment variable pointing to an inaccessible X display. Under these conditions, xterm generates a core dump file. However, due to improper handling of symbolic links, a local attacker can create a symlink pointing the core dump file to an arbitrary file on the system. When xterm crashes and writes the core dump, it overwrites the target file specified by the symlink. This allows local users to overwrite arbitrary files, potentially including critical system files or configuration files, leading to privilege escalation or system compromise. The vulnerability requires local access to the system and does not require authentication beyond that. The CVSS score of 7.2 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file overwrite can lead to full system compromise. No patch is available, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects a legacy operating system version, Digital UNIX 4.0B, which is a variant of the UNIX operating system used primarily on DEC Alpha hardware platforms.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Digital UNIX 4.0B systems, which is uncommon in modern environments. However, if such systems are present, the ability for a local user to overwrite arbitrary files could lead to privilege escalation, unauthorized access, and potential disruption of critical services. This could compromise sensitive data confidentiality, integrity, and availability. Given the age of the vulnerability and lack of patch, organizations relying on these legacy systems face increased risk if local access controls are weak or if untrusted users have shell access. The vulnerability could be exploited to implant backdoors, modify system binaries, or disrupt operations, which is particularly concerning for industrial, governmental, or research institutions that may still use legacy UNIX systems for specialized applications.

Mitigation Recommendations

Since no official patch is available, mitigation must focus on reducing the attack surface and limiting local user capabilities. Specific recommendations include: 1) Restrict local user access to trusted personnel only and enforce strict access controls and monitoring on systems running Digital UNIX 4.0B. 2) Disable core dumps for xterm or the entire system by configuring system limits (e.g., using 'ulimit -c 0') to prevent core dump file creation, thereby eliminating the vector for the symlink attack. 3) Use file system permissions and mount options to prevent users from creating symbolic links in directories where core dumps are generated. 4) Consider isolating or decommissioning legacy Digital UNIX systems in favor of modern, supported operating systems with active security updates. 5) Monitor system logs for unusual core dump activity or file modifications indicative of exploitation attempts. 6) Employ mandatory access control mechanisms if available to restrict file overwrite capabilities of local users.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de863

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:56:13 AM

Last updated: 2/7/2026, 7:29:03 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats