Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1402: The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other

0
Low
VulnerabilityCVE-1999-1402cve-1999-1402
Published: Sat May 17 1997 (05/17/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 07/01/2025, 23:56:48 UTC

Technical Analysis

CVE-1999-1402 is a vulnerability affecting UNIX domain sockets in older versions of Solaris (2.x), SunOS (4.x), and other BSD-based operating systems prior to version 4.4. The core issue lies in the operating system's failure to enforce access permissions on UNIX domain sockets properly. UNIX domain sockets are used for inter-process communication (IPC) on the same host, and they rely on file system permissions to restrict which local users or processes can connect to them. Due to this vulnerability, local users can bypass these permission checks and connect to sockets they should not have access to. This unauthorized access could allow attackers to disrupt the normal operation of the programs using these sockets or potentially control them by sending crafted data or commands. The vulnerability is local in nature, meaning an attacker must already have some level of access to the system to exploit it. The CVSS score of 2.1 (low severity) reflects the limited scope and impact, as confidentiality is not affected, but integrity can be compromised. No authentication is required beyond local access, and exploitation does not require user interaction. There are no known patches or exploits in the wild, likely due to the age of the affected systems and their limited use in modern environments. The affected versions include a range of FreeBSD releases from 2.2.2 through 5.5.1, Solaris 2.x, and SunOS 4.x, which are all legacy operating systems largely replaced by modern alternatives.

Potential Impact

For European organizations, the impact of this vulnerability is generally minimal in contemporary contexts because the affected operating systems are obsolete and rarely used in production environments. However, organizations that maintain legacy systems for critical infrastructure, industrial control, or historical data access might still be at risk. Exploitation could allow a local attacker to interfere with or take control of processes communicating over UNIX domain sockets, potentially disrupting services or corrupting data integrity. This could lead to operational downtime or unauthorized manipulation of sensitive processes. Since the vulnerability does not affect confidentiality and requires local access, the risk is confined to insiders or attackers who have already breached perimeter defenses. Nonetheless, in sensitive environments such as government agencies, research institutions, or legacy industrial systems in Europe, the vulnerability could be leveraged as part of a broader attack chain.

Mitigation Recommendations

Given the absence of official patches, European organizations should consider the following specific mitigations: 1) Phase out and replace legacy Solaris 2.x, SunOS 4.x, and early FreeBSD systems with supported, modern operating systems that enforce proper socket permissions. 2) Restrict local user access to legacy systems strictly, employing strong access controls, user account management, and monitoring to prevent unauthorized local logins. 3) Use mandatory access control (MAC) frameworks or sandboxing techniques where possible to limit the ability of local users to interact with critical IPC mechanisms. 4) Audit and monitor UNIX domain socket usage on legacy systems to detect unusual connection attempts or suspicious IPC activity. 5) If legacy systems must remain operational, isolate them within secure network segments with limited user access and no direct internet exposure. 6) Document and review all local user privileges regularly to minimize the number of accounts that could exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32ab6fd31d6ed7de6ca

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:56:48 PM

Last updated: 3/24/2026, 11:00:59 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses