Skip to main content

CVE-1999-1413: Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user

Medium
VulnerabilityCVE-1999-1413cve-1999-1413
Published: Sat Aug 03 1996 (08/03/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:54:33 UTC

Technical Analysis

CVE-1999-1413 is a vulnerability affecting Solaris operating system versions 2.4 and 5.4, specifically prior to the installation of kernel jumbo patch -35. The flaw allows set-group-ID (set-gid) programs to generate core dumps even when the real user ID is not a member of the set-gid group. Normally, core dumps are disabled or restricted for set-gid programs to prevent privilege escalation or information leakage. However, due to this vulnerability, local users can exploit the core dump mechanism to overwrite or create files with elevated privileges. This can be achieved by triggering a core dump, for example, through the dmesg command or other means that cause the program to crash and dump its memory. The vulnerability arises because the kernel does not properly restrict core dump generation for set-gid processes, allowing unauthorized users to write core files that may be placed in locations accessible to privileged users or processes. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected Solaris versions (2.4 and 5.4), this vulnerability is primarily relevant in legacy environments still running these outdated systems.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy Solaris 2.4 or 5.4 systems are still in operation. If such systems are present, local users could exploit this flaw to escalate privileges by manipulating core dumps, potentially leading to unauthorized file creation or modification with elevated rights. This could compromise system integrity and confidentiality, and potentially availability if critical files are overwritten or corrupted. In environments where Solaris systems are used for critical infrastructure, industrial control, or legacy financial systems, exploitation could disrupt operations or lead to data breaches. However, given the age and obsolescence of the affected Solaris versions, the practical risk is limited to organizations that have not migrated to newer, supported operating systems. European organizations with legacy IT infrastructure in sectors such as manufacturing, telecommunications, or government may be more exposed if they still rely on these Solaris versions.

Mitigation Recommendations

Since no official patch is available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Identify and inventory any Solaris 2.4 or 5.4 systems in their environment. 2) Where possible, upgrade or migrate these systems to supported Solaris versions or alternative operating systems that do not have this vulnerability. 3) Restrict local user access on affected systems to trusted administrators only, minimizing the risk of local exploitation. 4) Disable core dumps for set-gid programs manually by configuring system parameters or using kernel-level controls if available. 5) Monitor system logs and dmesg outputs for unusual core dump activity or unauthorized file creation. 6) Implement strict file system permissions and integrity monitoring to detect unauthorized changes. 7) Employ host-based intrusion detection systems (HIDS) to alert on suspicious behavior related to core dumps or privilege escalation attempts. These measures will reduce the attack surface and help detect or prevent exploitation in the absence of a patch.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de4ff

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:54:33 AM

Last updated: 8/14/2025, 1:46:18 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats