Skip to main content

CVE-1999-1545: Joe's Own Editor (joe) 2.8 sets the world-readable permission on its crash-save file, DEADJOE, which

Low
VulnerabilityCVE-1999-1545cve-1999-1545
Published: Wed Jul 14 1999 (07/14/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: joes_own_editor
Product: joe

Description

Joe's Own Editor (joe) 2.8 sets the world-readable permission on its crash-save file, DEADJOE, which could allow local users to read files that were being edited by other users.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:43:37 UTC

Technical Analysis

CVE-1999-1545 is a vulnerability found in Joe's Own Editor (joe) version 2.8, a text editor commonly used in Unix-like systems. The issue arises because the editor sets the world-readable permission on its crash-save file named DEADJOE. This file is created to preserve the contents being edited in the event of an unexpected crash or termination of the editor. However, by making this file world-readable, any local user on the same system can read the contents of the DEADJOE file, potentially exposing sensitive information that other users were editing. This vulnerability does not allow modification or deletion of files, nor does it affect the integrity or availability of the system or data. It solely impacts confidentiality by allowing unauthorized local users to read potentially sensitive data. The vulnerability requires local access to the system, as remote exploitation is not feasible without prior access. There is no patch available for this issue, and no known exploits have been reported in the wild. The CVSS score is 2.1 (low severity), reflecting the limited impact and the requirement for local access without authentication. Given the age of the vulnerability (published in 1999) and the specific version affected (2.8), modern systems and updated versions of joe are unlikely to be affected.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to its requirement for local access and the limited scope of information disclosure. However, in multi-user environments such as shared servers, development environments, or academic institutions where joe 2.8 might still be in use, sensitive information could be inadvertently exposed to unauthorized users. This could lead to minor confidentiality breaches, especially if users edit sensitive configuration files, credentials, or proprietary code. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. Given the low severity and the age of the vulnerability, the risk to most European organizations is minimal, but organizations with legacy systems or shared user environments should be aware of this exposure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Upgrade to a newer version of joe or switch to alternative text editors that do not exhibit this behavior. 2) Restrict local user access on multi-user systems to trusted personnel only, minimizing the risk of unauthorized file reading. 3) Implement strict file system permissions and user isolation techniques such as using containers or virtual machines to separate user environments. 4) Regularly audit file permissions on temporary and crash-save files to ensure they are not world-readable. 5) Educate users about the risks of editing sensitive files on shared systems and encourage the use of encrypted storage or secure editing environments. Since no patch is available for version 2.8, these operational and procedural controls are essential to reduce exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df0ee

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:43:37 PM

Last updated: 7/29/2025, 7:08:23 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats