Skip to main content

CVE-1999-1302: Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root ac

High
VulnerabilityCVE-1999-1302cve-1999-1302
Published: Wed Nov 30 1994 (11/30/1994, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: open_desktop

Description

Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:41:57 UTC

Technical Analysis

CVE-1999-1302 is a high-severity local privilege escalation vulnerability found in the pt_chmod utility of SCO UNIX versions 4.2 and earlier, including affected versions 2.0, 3.0, 3.2, 4.0, and 4.1 of the SCO Open Desktop product. The vulnerability allows a local user to gain root-level access on the affected system. Although the exact technical details of the vulnerability are unspecified, the nature of the flaw in pt_chmod—a utility likely involved in changing file permissions—suggests that it improperly handles permission changes or fails to enforce security checks, enabling privilege escalation. The CVSS v2 score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with low attack complexity and no authentication required, but limited to local access. No patch is available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1994), it primarily affects legacy SCO UNIX systems that may still be in use in niche or legacy environments.

Potential Impact

For European organizations, the impact of this vulnerability is significant primarily in environments where legacy SCO UNIX systems are still operational. Successful exploitation allows a local attacker to escalate privileges to root, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and the ability to install persistent malware or backdoors. Although modern systems are unlikely to be affected, certain industrial, governmental, or specialized sectors in Europe may still rely on legacy UNIX systems for critical operations. In such cases, this vulnerability could be exploited by insiders or attackers who gain local access, posing a severe risk to confidentiality, integrity, and availability of systems and data.

Mitigation Recommendations

Given that no patch is available, European organizations should focus on compensating controls and risk mitigation strategies. These include: 1) Restricting local access strictly to trusted users and enforcing strong physical and logical access controls to prevent unauthorized local logins. 2) Isolating legacy SCO UNIX systems from general networks to limit exposure and potential attack vectors. 3) Employing host-based intrusion detection systems (HIDS) and monitoring for unusual privilege escalation attempts or suspicious activity on these systems. 4) Considering virtualization or migration strategies to replace legacy SCO UNIX systems with modern, supported operating systems that receive security updates. 5) Conducting regular security audits and user privilege reviews to minimize the number of users with local access. 6) Implementing strict file integrity monitoring on critical binaries such as pt_chmod to detect unauthorized modifications.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de447

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 4:41:57 PM

Last updated: 8/15/2025, 10:05:41 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats