CVE-1999-1332: gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
AI Analysis
Technical Summary
CVE-1999-1332 is a local privilege vulnerability found in the gzexe utility, which is part of the gzip package on Red Hat Linux 5.0 and earlier versions. The vulnerability arises because gzexe creates temporary files insecurely, allowing a local attacker to perform a symlink attack. Specifically, an attacker can create a symbolic link pointing from the temporary file name used by gzexe to an arbitrary file owned by another user. When gzexe writes to this temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to unauthorized modification of files owned by other users, impacting file integrity. The vulnerability requires local access to the system, as it cannot be exploited remotely. There is no indication that authentication is required beyond local user access, and no user interaction is needed beyond executing gzexe. The CVSS score is 2.1 (low severity), reflecting the limited impact and exploitation complexity. No patches or fixes are available, and no known exploits have been reported in the wild. Given the age of the vulnerability and the affected product versions, this issue is primarily relevant to legacy systems still running Red Hat Linux 5.0 or earlier.
Potential Impact
For European organizations, the impact of CVE-1999-1332 is generally low due to the vulnerability's age, limited scope, and requirement for local access. However, organizations that maintain legacy Red Hat Linux 5.0 or earlier systems could face risks of unauthorized file modification by local users, potentially leading to data integrity issues or privilege escalation if critical configuration or executable files are overwritten. This could disrupt operations or compromise system stability. In environments with shared user access or weak local user controls, the risk is higher. Modern systems and updated Linux distributions are not affected, so the threat is mostly confined to outdated infrastructure. Nonetheless, organizations with legacy systems in sectors such as industrial control, research, or government that have not been upgraded may need to consider this vulnerability in their risk assessments.
Mitigation Recommendations
Since no official patch is available, organizations should prioritize upgrading affected systems to supported and updated Linux distributions that do not include this vulnerability. If upgrading is not immediately possible, administrators should restrict local user access to trusted personnel only and implement strict file system permissions to limit the ability to create symlinks or write to sensitive directories. Monitoring for unusual file modifications and employing intrusion detection systems to detect local privilege abuse attempts can help mitigate risk. Additionally, disabling or removing the gzexe utility from legacy systems can prevent exploitation. Regular audits of legacy systems should be conducted to identify and remediate insecure temporary file handling practices. Finally, organizations should develop a migration plan away from unsupported operating systems to reduce exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-1999-1332: gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of
Description
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
AI-Powered Analysis
Technical Analysis
CVE-1999-1332 is a local privilege vulnerability found in the gzexe utility, which is part of the gzip package on Red Hat Linux 5.0 and earlier versions. The vulnerability arises because gzexe creates temporary files insecurely, allowing a local attacker to perform a symlink attack. Specifically, an attacker can create a symbolic link pointing from the temporary file name used by gzexe to an arbitrary file owned by another user. When gzexe writes to this temporary file, it inadvertently overwrites the target file pointed to by the symlink. This can lead to unauthorized modification of files owned by other users, impacting file integrity. The vulnerability requires local access to the system, as it cannot be exploited remotely. There is no indication that authentication is required beyond local user access, and no user interaction is needed beyond executing gzexe. The CVSS score is 2.1 (low severity), reflecting the limited impact and exploitation complexity. No patches or fixes are available, and no known exploits have been reported in the wild. Given the age of the vulnerability and the affected product versions, this issue is primarily relevant to legacy systems still running Red Hat Linux 5.0 or earlier.
Potential Impact
For European organizations, the impact of CVE-1999-1332 is generally low due to the vulnerability's age, limited scope, and requirement for local access. However, organizations that maintain legacy Red Hat Linux 5.0 or earlier systems could face risks of unauthorized file modification by local users, potentially leading to data integrity issues or privilege escalation if critical configuration or executable files are overwritten. This could disrupt operations or compromise system stability. In environments with shared user access or weak local user controls, the risk is higher. Modern systems and updated Linux distributions are not affected, so the threat is mostly confined to outdated infrastructure. Nonetheless, organizations with legacy systems in sectors such as industrial control, research, or government that have not been upgraded may need to consider this vulnerability in their risk assessments.
Mitigation Recommendations
Since no official patch is available, organizations should prioritize upgrading affected systems to supported and updated Linux distributions that do not include this vulnerability. If upgrading is not immediately possible, administrators should restrict local user access to trusted personnel only and implement strict file system permissions to limit the ability to create symlinks or write to sensitive directories. Monitoring for unusual file modifications and employing intrusion detection systems to detect local privilege abuse attempts can help mitigate risk. Additionally, disabling or removing the gzexe utility from legacy systems can prevent exploitation. Regular audits of legacy systems should be conducted to identify and remediate insecure temporary file handling practices. Finally, organizations should develop a migration plan away from unsupported operating systems to reduce exposure to this and other legacy vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df64a
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 11:26:51 AM
Last updated: 8/14/2025, 7:08:06 PM
Views: 12
Related Threats
CVE-2025-43733: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-54234: Server-Side Request Forgery (SSRF) (CWE-918) in Adobe ColdFusion
LowCVE-2025-3639: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Liferay Portal
LowCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.