CVE-1999-1298: Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user withou
Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.
AI Analysis
Technical Summary
CVE-1999-1298 is a high-severity vulnerability affecting FreeBSD versions 2.2.1 and earlier, specifically during the configuration of anonymous FTP via the sysinstall utility. When sysinstall sets up anonymous FTP, it creates an 'ftp' user account without assigning a password and configures the user's shell to /bin/date. This misconfiguration can be exploited by attackers to gain unauthorized access to system resources. The lack of a password means that the ftp user account can be accessed without authentication, and although the shell is set to /bin/date (a non-interactive command), attackers might leverage this to execute commands or escalate privileges indirectly. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The impact on confidentiality, integrity, and availability is significant (all rated as partial to complete compromise), leading to a CVSS v2 base score of 7.5. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected FreeBSD versions (2.1.x and 2.2), this vulnerability primarily concerns legacy systems that remain in operation without updates or mitigation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy FreeBSD systems are still in use, particularly those configured to provide anonymous FTP services. If such systems are exposed to untrusted networks, attackers could gain unauthorized access to system resources, potentially leading to data leakage, unauthorized data modification, or service disruption. This could affect organizations relying on legacy infrastructure for file sharing or archival services. The compromise of these systems could also serve as a foothold for further network intrusion. Although modern FreeBSD versions are not affected, organizations with outdated systems or embedded devices running these versions remain at risk. The lack of patches increases the risk, as mitigation must rely on configuration changes or network controls. Given the vulnerability's network accessibility and no authentication requirement, exploitation could be straightforward if the vulnerable service is exposed.
Mitigation Recommendations
Since no official patches are available, European organizations should prioritize decommissioning or upgrading affected FreeBSD systems to supported versions that have addressed this vulnerability. If upgrading is not immediately feasible, organizations should disable anonymous FTP services configured via sysinstall or restrict access to these services using network-level controls such as firewalls or VPNs to limit exposure to trusted networks only. Additionally, administrators should verify and correct the ftp user account configuration by assigning a strong password and changing the shell to a non-executable or restricted shell to prevent command execution. Monitoring and logging FTP access attempts can help detect suspicious activity. Implementing intrusion detection systems to alert on anomalous FTP usage is also recommended. Finally, organizations should conduct audits to identify any legacy systems running these vulnerable FreeBSD versions and plan for their replacement or isolation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-1999-1298: Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user withou
Description
Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.
AI-Powered Analysis
Technical Analysis
CVE-1999-1298 is a high-severity vulnerability affecting FreeBSD versions 2.2.1 and earlier, specifically during the configuration of anonymous FTP via the sysinstall utility. When sysinstall sets up anonymous FTP, it creates an 'ftp' user account without assigning a password and configures the user's shell to /bin/date. This misconfiguration can be exploited by attackers to gain unauthorized access to system resources. The lack of a password means that the ftp user account can be accessed without authentication, and although the shell is set to /bin/date (a non-interactive command), attackers might leverage this to execute commands or escalate privileges indirectly. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The impact on confidentiality, integrity, and availability is significant (all rated as partial to complete compromise), leading to a CVSS v2 base score of 7.5. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected FreeBSD versions (2.1.x and 2.2), this vulnerability primarily concerns legacy systems that remain in operation without updates or mitigation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy FreeBSD systems are still in use, particularly those configured to provide anonymous FTP services. If such systems are exposed to untrusted networks, attackers could gain unauthorized access to system resources, potentially leading to data leakage, unauthorized data modification, or service disruption. This could affect organizations relying on legacy infrastructure for file sharing or archival services. The compromise of these systems could also serve as a foothold for further network intrusion. Although modern FreeBSD versions are not affected, organizations with outdated systems or embedded devices running these versions remain at risk. The lack of patches increases the risk, as mitigation must rely on configuration changes or network controls. Given the vulnerability's network accessibility and no authentication requirement, exploitation could be straightforward if the vulnerable service is exposed.
Mitigation Recommendations
Since no official patches are available, European organizations should prioritize decommissioning or upgrading affected FreeBSD systems to supported versions that have addressed this vulnerability. If upgrading is not immediately feasible, organizations should disable anonymous FTP services configured via sysinstall or restrict access to these services using network-level controls such as firewalls or VPNs to limit exposure to trusted networks only. Additionally, administrators should verify and correct the ftp user account configuration by assigning a strong password and changing the shell to a non-executable or restricted shell to prevent command execution. Monitoring and logging FTP access attempts can help detect suspicious activity. Implementing intrusion detection systems to alert on anomalous FTP usage is also recommended. Finally, organizations should conduct audits to identify any legacy systems running these vulnerable FreeBSD versions and plan for their replacement or isolation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de68a
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/1/2025, 11:13:51 AM
Last updated: 7/30/2025, 10:38:58 PM
Views: 14
Related Threats
CVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighCVE-2025-51965: n/a
HighCVE-2025-8980: Insufficient Verification of Data Authenticity in Tenda G1
HighCVE-2025-8979: Insufficient Verification of Data Authenticity in Tenda AC15
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.