Skip to main content

CVE-1999-1348: Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdow

Low
VulnerabilityCVE-1999-1348cve-1999-1348denial of service
Published: Wed Jun 30 1999 (06/30/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:57:20 UTC

Technical Analysis

CVE-1999-1348 is a vulnerability identified in Linuxconf on Red Hat Linux 6.0 and earlier versions. Linuxconf is a system configuration tool that interacts with PAM (Pluggable Authentication Modules) for managing access controls. The vulnerability arises because Linuxconf does not properly disable PAM-based access to the shutdown command. This improper configuration allows local users to invoke the shutdown command via PAM without appropriate restrictions, potentially causing a denial of service (DoS) by shutting down or rebooting the system unexpectedly. The vulnerability is local access only (AV:L), requires low attack complexity (AC:L), and does not require authentication (Au:N). It impacts availability (A:P) but does not affect confidentiality or integrity. The CVSS score is low (2.1), reflecting limited impact and exploitation scope. Since this vulnerability dates back to 1999 and affects very old versions of Red Hat Linux (6.0 and earlier), it is largely obsolete in modern environments. No patches are available, and no known exploits have been reported in the wild. However, if legacy systems are still in use, this vulnerability could be exploited by any local user with access to the system to cause service disruption by shutting down the machine unexpectedly.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal because Red Hat Linux 6.0 and earlier are extremely outdated and unlikely to be in active use in production environments. However, organizations that maintain legacy systems for critical infrastructure, industrial control, or archival purposes could be at risk of local denial of service attacks if these systems are accessible to untrusted local users. The impact would be service disruption, potentially affecting availability of critical systems. Given the low severity and local access requirement, remote exploitation is not feasible, limiting the threat to insider or physically proximate attackers. Organizations relying on legacy Red Hat Linux systems should be aware that this vulnerability could be leveraged to cause unexpected shutdowns, leading to downtime and potential operational disruptions.

Mitigation Recommendations

Since no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should restrict local access to legacy Red Hat Linux 6.0 and earlier systems to trusted personnel only. Implement strict physical security and user access controls to prevent unauthorized local logins. Consider disabling or restricting the use of Linuxconf if it is not essential, or replacing it with more secure configuration tools. Monitoring and alerting on shutdown commands can help detect potential exploitation attempts. Additionally, organizations should plan to upgrade legacy systems to supported versions of Linux distributions that have addressed this and other vulnerabilities. Where upgrade is not feasible, isolating legacy systems from critical networks and limiting user privileges can reduce risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df0b8

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:57:20 PM

Last updated: 8/15/2025, 12:54:04 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats