CVE-1999-1210: xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a
xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.
AI Analysis
Technical Summary
CVE-1999-1210 is a high-severity local privilege vulnerability affecting the xterm terminal emulator on Digital UNIX 4.0B systems with patch kit 5. The vulnerability arises from the way xterm handles core dump files when invoked with a DISPLAY environment variable pointing to an inaccessible X display. Under these conditions, xterm generates a core dump file. However, due to improper handling of symbolic links, a local attacker can create a symlink pointing the core dump file to an arbitrary file on the system. When xterm crashes and writes the core dump, it overwrites the target file specified by the symlink. This allows local users to overwrite arbitrary files, potentially including critical system files or configuration files, leading to privilege escalation or system compromise. The vulnerability requires local access to the system and does not require authentication beyond that. The CVSS score of 7.2 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file overwrite can lead to full system compromise. No patch is available, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects a legacy operating system version, Digital UNIX 4.0B, which is a variant of the UNIX operating system used primarily on DEC Alpha hardware platforms.
Potential Impact
For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Digital UNIX 4.0B systems, which is uncommon in modern environments. However, if such systems are present, the ability for a local user to overwrite arbitrary files could lead to privilege escalation, unauthorized access, and potential disruption of critical services. This could compromise sensitive data confidentiality, integrity, and availability. Given the age of the vulnerability and lack of patch, organizations relying on these legacy systems face increased risk if local access controls are weak or if untrusted users have shell access. The vulnerability could be exploited to implant backdoors, modify system binaries, or disrupt operations, which is particularly concerning for industrial, governmental, or research institutions that may still use legacy UNIX systems for specialized applications.
Mitigation Recommendations
Since no official patch is available, mitigation must focus on reducing the attack surface and limiting local user capabilities. Specific recommendations include: 1) Restrict local user access to trusted personnel only and enforce strict access controls and monitoring on systems running Digital UNIX 4.0B. 2) Disable core dumps for xterm or the entire system by configuring system limits (e.g., using 'ulimit -c 0') to prevent core dump file creation, thereby eliminating the vector for the symlink attack. 3) Use file system permissions and mount options to prevent users from creating symbolic links in directories where core dumps are generated. 4) Consider isolating or decommissioning legacy Digital UNIX systems in favor of modern, supported operating systems with active security updates. 5) Monitor system logs for unusual core dump activity or file modifications indicative of exploitation attempts. 6) Employ mandatory access control mechanisms if available to restrict file overwrite capabilities of local users.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden
CVE-1999-1210: xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a
Description
xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.
AI-Powered Analysis
Technical Analysis
CVE-1999-1210 is a high-severity local privilege vulnerability affecting the xterm terminal emulator on Digital UNIX 4.0B systems with patch kit 5. The vulnerability arises from the way xterm handles core dump files when invoked with a DISPLAY environment variable pointing to an inaccessible X display. Under these conditions, xterm generates a core dump file. However, due to improper handling of symbolic links, a local attacker can create a symlink pointing the core dump file to an arbitrary file on the system. When xterm crashes and writes the core dump, it overwrites the target file specified by the symlink. This allows local users to overwrite arbitrary files, potentially including critical system files or configuration files, leading to privilege escalation or system compromise. The vulnerability requires local access to the system and does not require authentication beyond that. The CVSS score of 7.2 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file overwrite can lead to full system compromise. No patch is available, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects a legacy operating system version, Digital UNIX 4.0B, which is a variant of the UNIX operating system used primarily on DEC Alpha hardware platforms.
Potential Impact
For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Digital UNIX 4.0B systems, which is uncommon in modern environments. However, if such systems are present, the ability for a local user to overwrite arbitrary files could lead to privilege escalation, unauthorized access, and potential disruption of critical services. This could compromise sensitive data confidentiality, integrity, and availability. Given the age of the vulnerability and lack of patch, organizations relying on these legacy systems face increased risk if local access controls are weak or if untrusted users have shell access. The vulnerability could be exploited to implant backdoors, modify system binaries, or disrupt operations, which is particularly concerning for industrial, governmental, or research institutions that may still use legacy UNIX systems for specialized applications.
Mitigation Recommendations
Since no official patch is available, mitigation must focus on reducing the attack surface and limiting local user capabilities. Specific recommendations include: 1) Restrict local user access to trusted personnel only and enforce strict access controls and monitoring on systems running Digital UNIX 4.0B. 2) Disable core dumps for xterm or the entire system by configuring system limits (e.g., using 'ulimit -c 0') to prevent core dump file creation, thereby eliminating the vector for the symlink attack. 3) Use file system permissions and mount options to prevent users from creating symbolic links in directories where core dumps are generated. 4) Consider isolating or decommissioning legacy Digital UNIX systems in favor of modern, supported operating systems with active security updates. 5) Monitor system logs for unusual core dump activity or file modifications indicative of exploitation attempts. 6) Employ mandatory access control mechanisms if available to restrict file overwrite capabilities of local users.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7de863
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 6/30/2025, 7:56:13 AM
Last updated: 2/7/2026, 7:29:03 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.