Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1413: Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user

0
Medium
VulnerabilityCVE-1999-1413cve-1999-1413
Published: Sat Aug 03 1996 (08/03/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:54:33 UTC

Technical Analysis

CVE-1999-1413 is a vulnerability affecting Solaris operating system versions 2.4 and 5.4, specifically prior to the installation of kernel jumbo patch -35. The flaw allows set-group-ID (set-gid) programs to generate core dumps even when the real user ID is not a member of the set-gid group. Normally, core dumps are disabled or restricted for set-gid programs to prevent privilege escalation or information leakage. However, due to this vulnerability, local users can exploit the core dump mechanism to overwrite or create files with elevated privileges. This can be achieved by triggering a core dump, for example, through the dmesg command or other means that cause the program to crash and dump its memory. The vulnerability arises because the kernel does not properly restrict core dump generation for set-gid processes, allowing unauthorized users to write core files that may be placed in locations accessible to privileged users or processes. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected Solaris versions (2.4 and 5.4), this vulnerability is primarily relevant in legacy environments still running these outdated systems.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy Solaris 2.4 or 5.4 systems are still in operation. If such systems are present, local users could exploit this flaw to escalate privileges by manipulating core dumps, potentially leading to unauthorized file creation or modification with elevated rights. This could compromise system integrity and confidentiality, and potentially availability if critical files are overwritten or corrupted. In environments where Solaris systems are used for critical infrastructure, industrial control, or legacy financial systems, exploitation could disrupt operations or lead to data breaches. However, given the age and obsolescence of the affected Solaris versions, the practical risk is limited to organizations that have not migrated to newer, supported operating systems. European organizations with legacy IT infrastructure in sectors such as manufacturing, telecommunications, or government may be more exposed if they still rely on these Solaris versions.

Mitigation Recommendations

Since no official patch is available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Identify and inventory any Solaris 2.4 or 5.4 systems in their environment. 2) Where possible, upgrade or migrate these systems to supported Solaris versions or alternative operating systems that do not have this vulnerability. 3) Restrict local user access on affected systems to trusted administrators only, minimizing the risk of local exploitation. 4) Disable core dumps for set-gid programs manually by configuring system parameters or using kernel-level controls if available. 5) Monitor system logs and dmesg outputs for unusual core dump activity or unauthorized file creation. 6) Implement strict file system permissions and integrity monitoring to detect unauthorized changes. 7) Employ host-based intrusion detection systems (HIDS) to alert on suspicious behavior related to core dumps or privilege escalation attempts. These measures will reduce the attack surface and help detect or prevent exploitation in the absence of a patch.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de4ff

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:54:33 AM

Last updated: 2/7/2026, 2:59:06 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats