CVE-1999-1332: gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
AI Analysis
Technical Summary
CVE-1999-1332 is a local privilege vulnerability found in the gzexe utility, which is part of the gzip package on Red Hat Linux 5.0 and earlier versions. The vulnerability arises because gzexe creates temporary files insecurely, allowing a local attacker to perform a symlink attack. Specifically, an attacker can create a symbolic link pointing from the temporary file name used by gzexe to an arbitrary file owned by another user. When gzexe writes to this temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to unauthorized modification of files owned by other users, impacting file integrity. The vulnerability requires local access to the system, as it cannot be exploited remotely. There is no indication that authentication is required beyond local user access, and no user interaction is needed beyond executing gzexe. The CVSS score is 2.1 (low severity), reflecting the limited impact and exploitation complexity. No patches or fixes are available, and no known exploits have been reported in the wild. Given the age of the vulnerability and the affected product versions, this issue is primarily relevant to legacy systems still running Red Hat Linux 5.0 or earlier.
Potential Impact
For European organizations, the impact of CVE-1999-1332 is generally low due to the vulnerability's age, limited scope, and requirement for local access. However, organizations that maintain legacy Red Hat Linux 5.0 or earlier systems could face risks of unauthorized file modification by local users, potentially leading to data integrity issues or privilege escalation if critical configuration or executable files are overwritten. This could disrupt operations or compromise system stability. In environments with shared user access or weak local user controls, the risk is higher. Modern systems and updated Linux distributions are not affected, so the threat is mostly confined to outdated infrastructure. Nonetheless, organizations with legacy systems in sectors such as industrial control, research, or government that have not been upgraded may need to consider this vulnerability in their risk assessments.
Mitigation Recommendations
Since no official patch is available, organizations should prioritize upgrading affected systems to supported and updated Linux distributions that do not include this vulnerability. If upgrading is not immediately possible, administrators should restrict local user access to trusted personnel only and implement strict file system permissions to limit the ability to create symlinks or write to sensitive directories. Monitoring for unusual file modifications and employing intrusion detection systems to detect local privilege abuse attempts can help mitigate risk. Additionally, disabling or removing the gzexe utility from legacy systems can prevent exploitation. Regular audits of legacy systems should be conducted to identify and remediate insecure temporary file handling practices. Finally, organizations should develop a migration plan away from unsupported operating systems to reduce exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-1999-1332: gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of
Description
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
AI-Powered Analysis
Technical Analysis
CVE-1999-1332 is a local privilege vulnerability found in the gzexe utility, which is part of the gzip package on Red Hat Linux 5.0 and earlier versions. The vulnerability arises because gzexe creates temporary files insecurely, allowing a local attacker to perform a symlink attack. Specifically, an attacker can create a symbolic link pointing from the temporary file name used by gzexe to an arbitrary file owned by another user. When gzexe writes to this temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to unauthorized modification of files owned by other users, impacting file integrity. The vulnerability requires local access to the system, as it cannot be exploited remotely. There is no indication that authentication is required beyond local user access, and no user interaction is needed beyond executing gzexe. The CVSS score is 2.1 (low severity), reflecting the limited impact and exploitation complexity. No patches or fixes are available, and no known exploits have been reported in the wild. Given the age of the vulnerability and the affected product versions, this issue is primarily relevant to legacy systems still running Red Hat Linux 5.0 or earlier.
Potential Impact
For European organizations, the impact of CVE-1999-1332 is generally low due to the vulnerability's age, limited scope, and requirement for local access. However, organizations that maintain legacy Red Hat Linux 5.0 or earlier systems could face risks of unauthorized file modification by local users, potentially leading to data integrity issues or privilege escalation if critical configuration or executable files are overwritten. This could disrupt operations or compromise system stability. In environments with shared user access or weak local user controls, the risk is higher. Modern systems and updated Linux distributions are not affected, so the threat is mostly confined to outdated infrastructure. Nonetheless, organizations with legacy systems in sectors such as industrial control, research, or government that have not been upgraded may need to consider this vulnerability in their risk assessments.
Mitigation Recommendations
Since no official patch is available, organizations should prioritize upgrading affected systems to supported and updated Linux distributions that do not include this vulnerability. If upgrading is not immediately possible, administrators should restrict local user access to trusted personnel only and implement strict file system permissions to limit the ability to create symlinks or write to sensitive directories. Monitoring for unusual file modifications and employing intrusion detection systems to detect local privilege abuse attempts can help mitigate risk. Additionally, disabling or removing the gzexe utility from legacy systems can prevent exploitation. Regular audits of legacy systems should be conducted to identify and remediate insecure temporary file handling practices. Finally, organizations should develop a migration plan away from unsupported operating systems to reduce exposure to this and other legacy vulnerabilities.
Affected Countries
Threat ID: 682ca32db6fd31d6ed7df64a
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 11:26:51 AM
Last updated: 2/7/2026, 9:37:31 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.