Skip to main content

CVE-1999-1352: mknod in Linux 2.2 follows symbolic links, which could allow local users to overwrite files or gain

Medium
VulnerabilityCVE-1999-1352cve-1999-1352
Published: Tue Sep 28 1999 (09/28/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

mknod in Linux 2.2 follows symbolic links, which could allow local users to overwrite files or gain privileges.

AI-Powered Analysis

AILast updated: 07/01/2025, 15:14:20 UTC

Technical Analysis

CVE-1999-1352 is a vulnerability found in the Linux kernel version 2.2.0, specifically related to the behavior of the mknod system call. The mknod function is used to create filesystem nodes such as device files. In this vulnerable version, mknod follows symbolic links instead of properly handling them, which can lead to unintended consequences. A local user can exploit this flaw by creating a symbolic link pointing to a sensitive file and then invoking mknod on the link. Because mknod follows the symbolic link, it may overwrite or modify the target file, potentially leading to unauthorized file modification or privilege escalation. This vulnerability requires local access to the system, as it involves the use of the mknod system call by a local user. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local, the attack complexity is low, no authentication is required beyond local access, and the impact affects confidentiality, integrity, and availability to some extent. Since this vulnerability dates back to 1999 and affects an outdated kernel version (2.2.0), it is unlikely to be present in modern Linux distributions. No patch is available for this specific version, but modern kernels have long since addressed this issue. There are no known exploits in the wild currently documented for this vulnerability.

Potential Impact

For European organizations, the direct impact of CVE-1999-1352 is minimal in modern contexts because Linux kernel 2.2.0 is obsolete and unsupported. However, if legacy systems running this kernel version are still in use—such as in industrial control systems, embedded devices, or legacy servers—there is a risk that local users could exploit this vulnerability to overwrite critical system files or escalate privileges. This could lead to unauthorized access, data corruption, or disruption of services. The vulnerability compromises confidentiality, integrity, and availability, but only if an attacker has local access. The risk is therefore primarily internal, such as from malicious insiders or compromised user accounts. European organizations with legacy infrastructure should be aware of this risk, especially in sectors where legacy Linux systems remain operational due to long hardware lifecycles or specialized applications.

Mitigation Recommendations

1. Upgrade all Linux systems to a supported and updated kernel version well beyond 2.2.0, as modern kernels have fixed this vulnerability. 2. For legacy systems that cannot be upgraded immediately, restrict local user access strictly to trusted personnel and implement strong access controls and monitoring to detect suspicious activity involving mknod or symbolic links. 3. Employ filesystem integrity monitoring tools to detect unauthorized changes to critical files. 4. Use mandatory access control frameworks (e.g., SELinux, AppArmor) to limit the capabilities of local users and processes, preventing misuse of system calls like mknod. 5. Regularly audit and remove unnecessary device files and symbolic links that could be exploited. 6. If embedded or legacy devices are in use, consider network segmentation to isolate them from critical infrastructure and reduce the risk of lateral movement by attackers.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df29e

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 3:14:20 PM

Last updated: 8/11/2025, 10:31:57 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats