Skip to main content

CVE-1999-1298: Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user withou

High
VulnerabilityCVE-1999-1298cve-1999-1298rce
Published: Mon Apr 07 1997 (04/07/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:13:51 UTC

Technical Analysis

CVE-1999-1298 is a high-severity vulnerability affecting FreeBSD versions 2.2.1 and earlier, specifically during the configuration of anonymous FTP via the sysinstall utility. When sysinstall sets up anonymous FTP, it creates an 'ftp' user account without assigning a password and configures the user's shell to /bin/date. This misconfiguration can be exploited by attackers to gain unauthorized access to system resources. The lack of a password means that the ftp user account can be accessed without authentication, and although the shell is set to /bin/date (a non-interactive command), attackers might leverage this to execute commands or escalate privileges indirectly. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The impact on confidentiality, integrity, and availability is significant (all rated as partial to complete compromise), leading to a CVSS v2 base score of 7.5. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected FreeBSD versions (2.1.x and 2.2), this vulnerability primarily concerns legacy systems that remain in operation without updates or mitigation.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy FreeBSD systems are still in use, particularly those configured to provide anonymous FTP services. If such systems are exposed to untrusted networks, attackers could gain unauthorized access to system resources, potentially leading to data leakage, unauthorized data modification, or service disruption. This could affect organizations relying on legacy infrastructure for file sharing or archival services. The compromise of these systems could also serve as a foothold for further network intrusion. Although modern FreeBSD versions are not affected, organizations with outdated systems or embedded devices running these versions remain at risk. The lack of patches increases the risk, as mitigation must rely on configuration changes or network controls. Given the vulnerability's network accessibility and no authentication requirement, exploitation could be straightforward if the vulnerable service is exposed.

Mitigation Recommendations

Since no official patches are available, European organizations should prioritize decommissioning or upgrading affected FreeBSD systems to supported versions that have addressed this vulnerability. If upgrading is not immediately feasible, organizations should disable anonymous FTP services configured via sysinstall or restrict access to these services using network-level controls such as firewalls or VPNs to limit exposure to trusted networks only. Additionally, administrators should verify and correct the ftp user account configuration by assigning a strong password and changing the shell to a non-executable or restricted shell to prevent command execution. Monitoring and logging FTP access attempts can help detect suspicious activity. Implementing intrusion detection systems to alert on anomalous FTP usage is also recommended. Finally, organizations should conduct audits to identify any legacy systems running these vulnerable FreeBSD versions and plan for their replacement or isolation.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de68a

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:13:51 AM

Last updated: 7/30/2025, 10:38:58 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats