CVE-1999-1405: snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions
snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a.
AI Analysis
Technical Summary
CVE-1999-1405 is a critical vulnerability affecting IBM's AIX operating system versions prior to 4.3.2, specifically versions 3.2.5 through 4.2.1. The vulnerability arises from the behavior of the 'snap' command, which is used for system snapshot and diagnostic purposes. In these affected versions, the 'snap' command creates the directory /tmp/ibmsupt with world-readable permissions and fails to remove or clear this directory when the 'snap -a' option is executed. This improper handling allows a local attacker to exploit a race condition or directory pre-creation attack by placing a crafted file at /tmp/ibmsupt/general/passwd before the root user runs 'snap -a'. Because 'snap -a' operates with elevated privileges, it may inadvertently expose or overwrite sensitive files, including the shadowed password file, which contains hashed user passwords. The exposure of this file compromises the confidentiality and integrity of user credentials, enabling privilege escalation or unauthorized access. The vulnerability is particularly severe because it requires no authentication and can be exploited by any local user, with no user interaction beyond executing commands. The CVSS v2 score is 10.0, indicating a critical severity with network vector, low attack complexity, no authentication required, and full impact on confidentiality, integrity, and availability. Although no patches are available, the vulnerability is well-documented and stems from insecure file permissions and inadequate cleanup of temporary directories by the 'snap' utility.
Potential Impact
For European organizations still operating legacy AIX systems within the affected versions, this vulnerability poses a significant risk. The exposure of the shadowed password file can lead to credential theft, enabling attackers to escalate privileges to root or compromise other critical systems. This can result in unauthorized access to sensitive data, disruption of services, and potential lateral movement within the network. Given that AIX is commonly used in enterprise environments for critical applications, including financial services, manufacturing, and telecommunications, exploitation could have severe operational and reputational consequences. European organizations with legacy IBM infrastructure, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government, face heightened risks. Additionally, the vulnerability's local nature means that insider threats or attackers who gain initial footholds on systems could leverage this flaw to deepen their access. The lack of available patches means organizations must rely on compensating controls to mitigate risk. Although the vulnerability dates back to 1999, legacy systems in use without upgrades remain vulnerable, emphasizing the need for awareness and remediation.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement specific mitigations: 1) Restrict local user access on affected AIX systems to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Implement strict filesystem permissions and monitoring on the /tmp directory to detect unauthorized creation or modification of the /tmp/ibmsupt directory and its contents. 3) Employ mandatory access controls (MAC) or enhanced auditing to monitor and restrict the execution of the 'snap' command, especially with the '-a' option, to trusted administrators. 4) Where feasible, upgrade AIX systems to version 4.3.2 or later, which addresses this vulnerability. 5) Use filesystem integrity monitoring tools to detect suspicious changes to critical files such as /tmp/ibmsupt/general/passwd. 6) Isolate legacy AIX systems from general user environments and limit network access to reduce the risk of local exploitation. 7) Educate system administrators about the risks associated with the 'snap' command and enforce strict operational procedures to prevent accidental exposure. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring specific directories, and operational controls around the vulnerable utility.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Spain, Sweden
CVE-1999-1405: snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions
Description
snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a.
AI-Powered Analysis
Technical Analysis
CVE-1999-1405 is a critical vulnerability affecting IBM's AIX operating system versions prior to 4.3.2, specifically versions 3.2.5 through 4.2.1. The vulnerability arises from the behavior of the 'snap' command, which is used for system snapshot and diagnostic purposes. In these affected versions, the 'snap' command creates the directory /tmp/ibmsupt with world-readable permissions and fails to remove or clear this directory when the 'snap -a' option is executed. This improper handling allows a local attacker to exploit a race condition or directory pre-creation attack by placing a crafted file at /tmp/ibmsupt/general/passwd before the root user runs 'snap -a'. Because 'snap -a' operates with elevated privileges, it may inadvertently expose or overwrite sensitive files, including the shadowed password file, which contains hashed user passwords. The exposure of this file compromises the confidentiality and integrity of user credentials, enabling privilege escalation or unauthorized access. The vulnerability is particularly severe because it requires no authentication and can be exploited by any local user, with no user interaction beyond executing commands. The CVSS v2 score is 10.0, indicating a critical severity with network vector, low attack complexity, no authentication required, and full impact on confidentiality, integrity, and availability. Although no patches are available, the vulnerability is well-documented and stems from insecure file permissions and inadequate cleanup of temporary directories by the 'snap' utility.
Potential Impact
For European organizations still operating legacy AIX systems within the affected versions, this vulnerability poses a significant risk. The exposure of the shadowed password file can lead to credential theft, enabling attackers to escalate privileges to root or compromise other critical systems. This can result in unauthorized access to sensitive data, disruption of services, and potential lateral movement within the network. Given that AIX is commonly used in enterprise environments for critical applications, including financial services, manufacturing, and telecommunications, exploitation could have severe operational and reputational consequences. European organizations with legacy IBM infrastructure, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government, face heightened risks. Additionally, the vulnerability's local nature means that insider threats or attackers who gain initial footholds on systems could leverage this flaw to deepen their access. The lack of available patches means organizations must rely on compensating controls to mitigate risk. Although the vulnerability dates back to 1999, legacy systems in use without upgrades remain vulnerable, emphasizing the need for awareness and remediation.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement specific mitigations: 1) Restrict local user access on affected AIX systems to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Implement strict filesystem permissions and monitoring on the /tmp directory to detect unauthorized creation or modification of the /tmp/ibmsupt directory and its contents. 3) Employ mandatory access controls (MAC) or enhanced auditing to monitor and restrict the execution of the 'snap' command, especially with the '-a' option, to trusted administrators. 4) Where feasible, upgrade AIX systems to version 4.3.2 or later, which addresses this vulnerability. 5) Use filesystem integrity monitoring tools to detect suspicious changes to critical files such as /tmp/ibmsupt/general/passwd. 6) Isolate legacy AIX systems from general user environments and limit network access to reduce the risk of local exploitation. 7) Educate system administrators about the risks associated with the 'snap' command and enforce strict operational procedures to prevent accidental exposure. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring specific directories, and operational controls around the vulnerable utility.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7dee35
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 6/28/2025, 9:26:32 AM
Last updated: 7/31/2025, 12:38:21 PM
Views: 13
Related Threats
CVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-7664: CWE-862 Missing Authorization in loword AL Pack
HighCVE-2025-6080: CWE-269 Improper Privilege Management in dasinfomedia WPGYM - Wordpress Gym Management System
HighCVE-2025-6079: CWE-434 Unrestricted Upload of File with Dangerous Type in dasinfomedia School Management System for Wordpress
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.