Skip to main content

CVE-1999-1325: SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup fi

High
VulnerabilityCVE-1999-1325cve-1999-1325
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: vax_vms
Product: sas_system

Description

SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup file, which allows local users to gain privileges.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:38:22 UTC

Technical Analysis

CVE-1999-1325 is a high-severity vulnerability affecting SAS System version 5.18 running on the VAX/VMS operating system. The core issue stems from insecure permissions set on the software's directories and startup files. These improper permissions allow local users—those with access to the system—to escalate their privileges. Specifically, because the directories and startup files are not adequately protected, a local attacker can modify or replace these files to execute arbitrary code with elevated privileges. The vulnerability is classified with a CVSS score of 7.2, indicating a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning exploitation requires local access to the system. The attack complexity is low (AC:L), no authentication is required (Au:N), and successful exploitation can lead to complete compromise of the system's confidentiality, integrity, and availability (C:C/I:C/A:C). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1999) and the legacy nature of the VAX/VMS platform, this issue primarily affects environments still running this outdated combination, which are typically found in niche or legacy industrial, research, or governmental systems.

Potential Impact

For European organizations, the impact of this vulnerability depends heavily on the presence of legacy VAX/VMS systems running SAS System 5.18. Organizations in sectors such as research institutions, industrial control systems, or government agencies that maintain legacy infrastructure might be at risk. Exploitation allows local attackers to gain full control over affected systems, potentially leading to unauthorized data access, data manipulation, or disruption of critical services. This could result in loss of sensitive information, operational downtime, and damage to organizational reputation. Given the local access requirement, the threat is more significant in environments where multiple users have access to the same system or where insider threats exist. The lack of available patches means that mitigation relies on compensating controls. While the vulnerability is high severity, its practical impact in Europe is limited by the rarity of the affected platform and software combination in modern deployments.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should focus on the following specific mitigation strategies: 1) Conduct an inventory to identify any VAX/VMS systems running SAS System 5.18, prioritizing systems with multi-user access. 2) Restrict local access to these systems strictly to trusted administrators and users with a legitimate need. 3) Manually review and harden file and directory permissions for SAS System directories and startup files to ensure only authorized users have write or modify permissions. 4) Implement monitoring and auditing on these files and directories to detect unauthorized changes promptly. 5) Where possible, isolate legacy VAX/VMS systems from broader network access to limit exposure. 6) Consider migrating critical workloads off legacy platforms to supported and actively maintained systems. 7) Educate local users about the risks of privilege escalation and enforce strong access control policies. These targeted actions go beyond generic advice by focusing on the unique constraints of legacy VAX/VMS environments and the absence of vendor patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df633

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/25/2025, 4:38:22 PM

Last updated: 8/14/2025, 12:41:49 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats