Skip to main content

CVE-1999-1218: Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitr

Low
VulnerabilityCVE-1999-1218cve-1999-1218
Published: Thu Feb 18 1993 (02/18/1993, 05:00:00 UTC)
Source: NVD
Vendor/Project: commodore
Product: amiga_unix

Description

Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitrary files.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:57:18 UTC

Technical Analysis

CVE-1999-1218 is a vulnerability identified in the 'finger' utility of Commodore Amiga UNIX version 2.1p2a and earlier. The 'finger' command, traditionally used to display information about system users, contains a flaw that allows local users to read arbitrary files on the system. This vulnerability arises because the finger program does not properly restrict file access when processing user requests, enabling an attacker with local access to bypass intended file permission restrictions and read sensitive files. The vulnerability is local access only, meaning an attacker must already have some form of access to the system to exploit it. The CVSS score of 2.1 (low severity) reflects the limited impact and difficulty of exploitation. The vulnerability affects confidentiality (ability to read arbitrary files) but does not impact integrity or availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected system (Commodore Amiga UNIX, a legacy operating system from the early 1990s), this vulnerability is primarily of historical interest and is unlikely to be encountered in modern environments.

Potential Impact

For European organizations, the practical impact of CVE-1999-1218 is minimal to negligible. Commodore Amiga UNIX is an obsolete operating system that is no longer in commercial use or supported. Modern enterprise environments do not run this OS, and thus the risk of exploitation is extremely low. However, if any legacy systems running Amiga UNIX are still in operation within niche industrial or research environments, this vulnerability could allow local users to access sensitive files, potentially exposing confidential information. Since exploitation requires local access, the threat does not extend to remote attackers. The low severity and lack of known exploits further reduce the risk. Overall, the impact on confidentiality is limited and does not affect system integrity or availability.

Mitigation Recommendations

Given the absence of patches and the obsolescence of the affected system, the best mitigation strategy is to phase out or isolate any remaining Commodore Amiga UNIX systems. Organizations should migrate critical workloads to supported and actively maintained operating systems. For environments where legacy systems must remain operational, strict access controls should be enforced to limit local user privileges and prevent unauthorized access. Monitoring and auditing local user activities can help detect any misuse. Additionally, network segmentation should be employed to isolate legacy systems from broader enterprise networks to reduce the risk of lateral movement by attackers. Since no patches exist, these compensating controls are essential to mitigate risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de3e6

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 2:57:18 AM

Last updated: 7/26/2025, 7:45:43 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats