Skip to main content

CVE-1999-1299: rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of

High
VulnerabilityCVE-1999-1299cve-1999-1299
Published: Mon Feb 03 1997 (02/03/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:58:06 UTC

Technical Analysis

CVE-1999-1299 is a critical vulnerability affecting the rcp (remote copy) utility on various Linux systems, including Red Hat versions 3.1 and 4.0. The vulnerability arises because the rcp program allows a user with the UID 65535 (commonly the "nobody" user) to overwrite arbitrary files on the system. This occurs due to the way the UID 65535 is interpreted by system calls such as chown: it is treated as -1, causing these calls to fail to change file ownership as intended. Consequently, the attacker can overwrite files without proper ownership changes, potentially leading to privilege escalation or system compromise. The vulnerability is exploitable remotely without authentication (AV:N/AC:L/Au:N), and it impacts confidentiality, integrity, and availability (C:C/I:C/A:C), as indicated by the CVSS score of 10. The flaw is rooted in the handling of user IDs in the rcp utility, which is used to copy files between hosts over a network. Since rcp is a legacy tool, its continued presence on systems can pose significant security risks. No patch is available for this vulnerability, and no known exploits have been reported in the wild, but the severity and ease of exploitation make it a critical threat to affected systems.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those running legacy Linux systems such as Red Hat 3.1 or 4.0, which may still be in use in industrial control systems, research environments, or legacy application servers. Exploitation can lead to complete system compromise, allowing attackers to overwrite critical system files, escalate privileges, and potentially gain root access. This can result in data breaches, service disruptions, and loss of system integrity. Given the remote and unauthenticated nature of the exploit, attackers can leverage this vulnerability to infiltrate networks without prior access. The impact is particularly concerning for sectors with high security requirements such as finance, healthcare, government, and critical infrastructure within Europe. Additionally, the lack of available patches means organizations must rely on alternative mitigation strategies to protect their environments.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should take several specific steps to mitigate the risk: 1) Disable or remove the rcp utility entirely from all systems, replacing it with more secure alternatives such as scp or rsync over SSH, which provide encrypted and authenticated file transfers. 2) Audit all systems to identify any legacy Linux installations running vulnerable versions (Red Hat 3.1, 4.0) and prioritize their upgrade or decommissioning. 3) Implement strict network segmentation and firewall rules to restrict access to systems that may still require rcp, limiting exposure to trusted hosts only. 4) Monitor system logs and network traffic for unusual file overwrite activities or unauthorized access attempts related to rcp usage. 5) Employ host-based intrusion detection systems (HIDS) to detect anomalous file modifications or privilege escalations. 6) Educate system administrators and users about the risks of legacy utilities and enforce policies to avoid their use. These targeted measures go beyond generic advice by focusing on eliminating the vulnerable utility, restricting its use, and enhancing detection capabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de648

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:58:06 AM

Last updated: 8/18/2025, 11:30:09 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats