Skip to main content

CVE-1999-1405: snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions

High
VulnerabilityCVE-1999-1405cve-1999-1405
Published: Wed Feb 17 1999 (02/17/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ibm
Product: aix

Description

snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a.

AI-Powered Analysis

AILast updated: 06/28/2025, 09:26:32 UTC

Technical Analysis

CVE-1999-1405 is a critical vulnerability affecting IBM's AIX operating system versions prior to 4.3.2, specifically versions 3.2.5 through 4.2.1. The vulnerability arises from the behavior of the 'snap' command, which is used for system snapshot and diagnostic purposes. In these affected versions, the 'snap' command creates the directory /tmp/ibmsupt with world-readable permissions and fails to remove or clear this directory when the 'snap -a' option is executed. This improper handling allows a local attacker to exploit a race condition or directory pre-creation attack by placing a crafted file at /tmp/ibmsupt/general/passwd before the root user runs 'snap -a'. Because 'snap -a' operates with elevated privileges, it may inadvertently expose or overwrite sensitive files, including the shadowed password file, which contains hashed user passwords. The exposure of this file compromises the confidentiality and integrity of user credentials, enabling privilege escalation or unauthorized access. The vulnerability is particularly severe because it requires no authentication and can be exploited by any local user, with no user interaction beyond executing commands. The CVSS v2 score is 10.0, indicating a critical severity with network vector, low attack complexity, no authentication required, and full impact on confidentiality, integrity, and availability. Although no patches are available, the vulnerability is well-documented and stems from insecure file permissions and inadequate cleanup of temporary directories by the 'snap' utility.

Potential Impact

For European organizations still operating legacy AIX systems within the affected versions, this vulnerability poses a significant risk. The exposure of the shadowed password file can lead to credential theft, enabling attackers to escalate privileges to root or compromise other critical systems. This can result in unauthorized access to sensitive data, disruption of services, and potential lateral movement within the network. Given that AIX is commonly used in enterprise environments for critical applications, including financial services, manufacturing, and telecommunications, exploitation could have severe operational and reputational consequences. European organizations with legacy IBM infrastructure, especially those in sectors with stringent data protection requirements such as finance, healthcare, and government, face heightened risks. Additionally, the vulnerability's local nature means that insider threats or attackers who gain initial footholds on systems could leverage this flaw to deepen their access. The lack of available patches means organizations must rely on compensating controls to mitigate risk. Although the vulnerability dates back to 1999, legacy systems in use without upgrades remain vulnerable, emphasizing the need for awareness and remediation.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement specific mitigations: 1) Restrict local user access on affected AIX systems to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Implement strict filesystem permissions and monitoring on the /tmp directory to detect unauthorized creation or modification of the /tmp/ibmsupt directory and its contents. 3) Employ mandatory access controls (MAC) or enhanced auditing to monitor and restrict the execution of the 'snap' command, especially with the '-a' option, to trusted administrators. 4) Where feasible, upgrade AIX systems to version 4.3.2 or later, which addresses this vulnerability. 5) Use filesystem integrity monitoring tools to detect suspicious changes to critical files such as /tmp/ibmsupt/general/passwd. 6) Isolate legacy AIX systems from general user environments and limit network access to reduce the risk of local exploitation. 7) Educate system administrators about the risks associated with the 'snap' command and enforce strict operational procedures to prevent accidental exposure. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring specific directories, and operational controls around the vulnerable utility.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dee35

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 9:26:32 AM

Last updated: 7/31/2025, 12:38:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats