Skip to main content

CVE-1999-1305: Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.

High
VulnerabilityCVE-1999-1305cve-1999-1305
Published: Wed Nov 30 1994 (11/30/1994, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: open_desktop

Description

Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:41:13 UTC

Technical Analysis

CVE-1999-1305 is a high-severity local privilege escalation vulnerability found in the "at" program of SCO UNIX 4.2 and earlier versions, including affected versions 2.0, 3.0, 3.2, 4.0, and 4.1 of the SCO Open Desktop product. The "at" program is a utility used to schedule commands to be executed at a later time. Due to improper handling of permissions or insecure design, local users can exploit this vulnerability to gain root-level access on the affected system. This means that any user with local access can escalate their privileges to the highest level, compromising the confidentiality, integrity, and availability of the system. The vulnerability has a CVSS v2 base score of 7.2, indicating high severity, with the vector AV:L/AC:L/Au:N/C:C/I:C/A:C, meaning it requires local access, low attack complexity, no authentication, and results in complete compromise of confidentiality, integrity, and availability. No patches are available for this vulnerability, and there are no known exploits in the wild currently documented. Given the age of the vulnerability (published in 1994) and the legacy nature of SCO UNIX systems, this vulnerability primarily affects outdated and legacy environments still running these versions. Exploitation requires local access, so remote exploitation is not possible without prior system access.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy SCO UNIX systems are still in use within their infrastructure. Organizations that maintain legacy industrial control systems, telecommunications equipment, or specialized UNIX-based servers running SCO UNIX 4.2 or earlier could be at risk. Successful exploitation would allow an attacker with local access to gain root privileges, potentially leading to full system compromise, unauthorized data access, disruption of critical services, and the ability to install persistent backdoors or malware. This could have severe consequences for organizations in sectors such as manufacturing, energy, and government agencies that may still rely on legacy UNIX systems. However, given the age and rarity of these systems in modern environments, the overall impact on most European organizations is likely limited to niche legacy deployments.

Mitigation Recommendations

Since no official patches are available for this vulnerability, organizations should consider the following specific mitigation strategies: 1) Identify and inventory all SCO UNIX systems in the environment, especially versions 4.2 and earlier. 2) Isolate legacy SCO UNIX systems from general user access and restrict local access strictly to trusted administrators. 3) Employ strict access controls and monitoring on these systems to detect any unauthorized local access attempts. 4) Where possible, migrate legacy applications and services off SCO UNIX 4.2 or earlier to modern, supported operating systems that receive security updates. 5) Use virtualization or containerization to encapsulate legacy systems and limit their exposure. 6) Implement host-based intrusion detection systems (HIDS) to monitor for suspicious activity indicative of privilege escalation attempts. 7) Enforce strong physical security controls to prevent unauthorized physical access to affected systems. These targeted mitigations go beyond generic advice by focusing on legacy system identification, isolation, and monitoring.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de458

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 4:41:13 PM

Last updated: 8/8/2025, 7:57:48 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats