Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1458: Buffer overflow in at program in Digital UNIX 4.0 allows local users to gain root privileges via a l

0
High
VulnerabilityCVE-1999-1458cve-1999-1458buffer overflow
Published: Mon Jan 25 1999 (01/25/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: unix

Description

Buffer overflow in at program in Digital UNIX 4.0 allows local users to gain root privileges via a long command line argument.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/28/2025, 14:09:41 UTC

Technical Analysis

CVE-1999-1458 is a high-severity buffer overflow vulnerability found in the 'at' program on Digital UNIX version 4.0 and its subversions (4.0a through 4.0e). The 'at' utility is used to schedule commands to be executed at a later time. This vulnerability arises from improper handling of command line arguments, where a local user can supply an excessively long argument that overflows a buffer in the program's memory. This overflow can overwrite critical control data, allowing the attacker to execute arbitrary code with root privileges. The vulnerability requires local access to the system but does not require prior authentication, as the 'at' program is typically accessible to all users for job scheduling. Exploitation does not require user interaction beyond invoking the vulnerable command with crafted input. The CVSS v2 score is 7.2, reflecting high impact on confidentiality, integrity, and availability due to the ability to gain root-level control. No patches are available, and no known exploits are reported in the wild, likely due to the age of the vulnerability and the obsolescence of the affected platform. However, systems still running Digital UNIX 4.0 variants remain at risk if accessible to untrusted local users.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to legacy systems still running Digital UNIX 4.0 or its variants. Such systems, if present, could be compromised by local attackers to gain root privileges, leading to full system compromise. This could result in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. Although Digital UNIX is largely obsolete and replaced by modern UNIX/Linux variants, some industrial or governmental organizations might still operate legacy systems for specialized applications. The vulnerability's local access requirement limits remote exploitation, but insider threats or attackers with physical or remote local access could leverage this flaw to escalate privileges. The absence of patches means organizations must rely on compensating controls or system upgrades to mitigate risk. Given the high severity and potential for complete system takeover, the vulnerability poses a significant risk to any European entity maintaining affected systems.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running Digital UNIX 4.0 and its variants to assess exposure. 2) Where possible, upgrade or migrate legacy systems to supported and patched operating systems to eliminate the vulnerability. 3) Restrict local access to affected systems by enforcing strict access controls, including limiting user accounts that can execute the 'at' command. 4) Implement monitoring and auditing of 'at' command usage to detect anomalous or unauthorized job scheduling attempts. 5) Use host-based intrusion detection systems (HIDS) to monitor for suspicious process behavior indicative of exploitation attempts. 6) Employ physical security controls to prevent unauthorized local access. 7) If legacy systems must remain operational, consider disabling the 'at' service or restricting it to trusted administrators only. These steps reduce the attack surface and limit the potential for privilege escalation via this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32bb6fd31d6ed7dedad

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 2:09:41 PM

Last updated: 3/25/2026, 3:09:22 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses