Skip to main content

CVE-1999-1460: BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as

High
VulnerabilityCVE-1999-1460cve-1999-1460
Published: Tue Jul 13 1999 (07/13/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: bmc
Product: patrol_agent

Description

BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:54:51 UTC

Technical Analysis

CVE-1999-1460 is a high-severity local privilege escalation vulnerability affecting BMC PATROL SNMP Agent versions prior to 3.2.07, specifically versions 3.2, 3.2.3, and 3.2.5. The vulnerability arises because the SNMP agent's management program, snmpmagt, allows local users to specify an arbitrary file path as its second argument. Due to improper handling of this input, a local attacker can create arbitrary files with world-writable permissions owned by the root user. This effectively enables the attacker to write to files with elevated privileges, potentially leading to full system compromise. The vulnerability requires local access but no authentication, and the attack vector is local (AV:L). The ease of exploitation is low complexity (AC:L), and the impact on confidentiality, integrity, and availability is critical (C:C/I:C/A:C), as an attacker can modify system files or place malicious scripts that run with root privileges. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability dates back to 1999, indicating it affects legacy systems that may still be in operation in some environments. The lack of patch availability means mitigation must rely on compensating controls or upgrading to unaffected versions if possible.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy BMC PATROL SNMP Agent versions are still deployed, especially in critical infrastructure, industrial control systems, or enterprise environments relying on BMC monitoring tools. Successful exploitation allows local attackers to escalate privileges to root, potentially leading to unauthorized access to sensitive data, disruption of services, or persistent backdoors. This can compromise confidentiality, integrity, and availability of critical systems. Given the agent's role in monitoring and management, attackers could manipulate monitoring data or disable alerts, hindering incident detection and response. Organizations in sectors such as finance, energy, manufacturing, and government are particularly at risk if they use affected versions. The age of the vulnerability suggests that many organizations may have already upgraded or replaced the software, but those with legacy systems or insufficient patch management remain vulnerable.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should take the following specific mitigation steps: 1) Identify and inventory all instances of BMC PATROL SNMP Agent in their environment, focusing on versions 3.2, 3.2.3, and 3.2.5. 2) Where possible, upgrade to version 3.2.07 or later, which addresses the vulnerability. If upgrading is not feasible, consider removing or disabling the SNMP agent to eliminate the attack surface. 3) Restrict local user access to systems running the vulnerable agent to trusted personnel only, minimizing the risk of local exploitation. 4) Implement strict file system permissions and monitoring to detect creation of unexpected world-writable files, especially those owned by root. 5) Employ host-based intrusion detection systems (HIDS) to alert on suspicious file creation or privilege escalation attempts. 6) Harden system configurations to limit local user capabilities, such as using mandatory access controls (e.g., SELinux, AppArmor) to restrict the snmpmagt program's ability to write arbitrary files. 7) Conduct regular audits and monitoring of logs for unusual activity related to the SNMP agent. These targeted measures go beyond generic advice by focusing on compensating controls and detection strategies given the absence of patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df0ec

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:54:51 PM

Last updated: 8/17/2025, 1:52:17 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats