Skip to main content

CVE-1999-1210: xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a

High
VulnerabilityCVE-1999-1210cve-1999-1210
Published: Wed Nov 12 1997 (11/12/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: unix

Description

xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:56:13 UTC

Technical Analysis

CVE-1999-1210 is a high-severity local privilege vulnerability affecting the xterm terminal emulator on Digital UNIX 4.0B systems with patch kit 5. The vulnerability arises from the way xterm handles core dump files when invoked with a DISPLAY environment variable pointing to an inaccessible X display. Under these conditions, xterm generates a core dump file. However, due to improper handling of symbolic links, a local attacker can create a symlink pointing the core dump file to an arbitrary file on the system. When xterm crashes and writes the core dump, it overwrites the target file specified by the symlink. This allows local users to overwrite arbitrary files, potentially including critical system files or configuration files, leading to privilege escalation or system compromise. The vulnerability requires local access to the system and does not require authentication beyond that. The CVSS score of 7.2 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file overwrite can lead to full system compromise. No patch is available, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects a legacy operating system version, Digital UNIX 4.0B, which is a variant of the UNIX operating system used primarily on DEC Alpha hardware platforms.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those still operating legacy Digital UNIX 4.0B systems, which is uncommon in modern environments. However, if such systems are present, the ability for a local user to overwrite arbitrary files could lead to privilege escalation, unauthorized access, and potential disruption of critical services. This could compromise sensitive data confidentiality, integrity, and availability. Given the age of the vulnerability and lack of patch, organizations relying on these legacy systems face increased risk if local access controls are weak or if untrusted users have shell access. The vulnerability could be exploited to implant backdoors, modify system binaries, or disrupt operations, which is particularly concerning for industrial, governmental, or research institutions that may still use legacy UNIX systems for specialized applications.

Mitigation Recommendations

Since no official patch is available, mitigation must focus on reducing the attack surface and limiting local user capabilities. Specific recommendations include: 1) Restrict local user access to trusted personnel only and enforce strict access controls and monitoring on systems running Digital UNIX 4.0B. 2) Disable core dumps for xterm or the entire system by configuring system limits (e.g., using 'ulimit -c 0') to prevent core dump file creation, thereby eliminating the vector for the symlink attack. 3) Use file system permissions and mount options to prevent users from creating symbolic links in directories where core dumps are generated. 4) Consider isolating or decommissioning legacy Digital UNIX systems in favor of modern, supported operating systems with active security updates. 5) Monitor system logs for unusual core dump activity or file modifications indicative of exploitation attempts. 6) Employ mandatory access control mechanisms if available to restrict file overwrite capabilities of local users.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de863

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:56:13 AM

Last updated: 8/12/2025, 6:47:05 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats