Skip to main content

CVE-1999-1332: gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of

Low
VulnerabilityCVE-1999-1332cve-1999-1332
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:26:51 UTC

Technical Analysis

CVE-1999-1332 is a local privilege vulnerability found in the gzexe utility, which is part of the gzip package on Red Hat Linux 5.0 and earlier versions. The vulnerability arises because gzexe creates temporary files insecurely, allowing a local attacker to perform a symlink attack. Specifically, an attacker can create a symbolic link pointing from the temporary file name used by gzexe to an arbitrary file owned by another user. When gzexe writes to this temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to unauthorized modification of files owned by other users, impacting file integrity. The vulnerability requires local access to the system, as it cannot be exploited remotely. There is no indication that authentication is required beyond local user access, and no user interaction is needed beyond executing gzexe. The CVSS score is 2.1 (low severity), reflecting the limited impact and exploitation complexity. No patches or fixes are available, and no known exploits have been reported in the wild. Given the age of the vulnerability and the affected product versions, this issue is primarily relevant to legacy systems still running Red Hat Linux 5.0 or earlier.

Potential Impact

For European organizations, the impact of CVE-1999-1332 is generally low due to the vulnerability's age, limited scope, and requirement for local access. However, organizations that maintain legacy Red Hat Linux 5.0 or earlier systems could face risks of unauthorized file modification by local users, potentially leading to data integrity issues or privilege escalation if critical configuration or executable files are overwritten. This could disrupt operations or compromise system stability. In environments with shared user access or weak local user controls, the risk is higher. Modern systems and updated Linux distributions are not affected, so the threat is mostly confined to outdated infrastructure. Nonetheless, organizations with legacy systems in sectors such as industrial control, research, or government that have not been upgraded may need to consider this vulnerability in their risk assessments.

Mitigation Recommendations

Since no official patch is available, organizations should prioritize upgrading affected systems to supported and updated Linux distributions that do not include this vulnerability. If upgrading is not immediately possible, administrators should restrict local user access to trusted personnel only and implement strict file system permissions to limit the ability to create symlinks or write to sensitive directories. Monitoring for unusual file modifications and employing intrusion detection systems to detect local privilege abuse attempts can help mitigate risk. Additionally, disabling or removing the gzexe utility from legacy systems can prevent exploitation. Regular audits of legacy systems should be conducted to identify and remediate insecure temporary file handling practices. Finally, organizations should develop a migration plan away from unsupported operating systems to reduce exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df64a

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 11:26:51 AM

Last updated: 8/14/2025, 7:08:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats