Skip to main content

CVE-1999-1572: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask wh

Low
VulnerabilityCVE-1999-1572cve-1999-1572
Published: Tue Jul 16 1996 (07/16/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: debian
Product: debian_linux

Description

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:54:49 UTC

Technical Analysis

CVE-1999-1572 is a vulnerability affecting the cpio utility on several Unix-like operating systems, including FreeBSD 2.1.0, Debian GNU/Linux 3.0, and potentially other versions and distributions. The issue arises because cpio uses a zero umask (umask 0) when creating files with the -O (archive output) or -F (specify archive file) options. This results in files being created with permissions set to 0666 (readable and writable by all users). Consequently, any local user on the system can read or overwrite these files, which may lead to unauthorized disclosure of information or modification of archive contents. The vulnerability is local in nature, requiring the attacker to have access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the limited scope and impact. No patches are currently available, and there are no known exploits in the wild. The vulnerability mainly affects older versions of operating systems, some of which are now obsolete, but similar issues could theoretically exist in other versions if the umask behavior is unchanged.

Potential Impact

For European organizations, the impact of this vulnerability is generally low given its local access requirement and the fact that it affects older operating system versions that are largely out of mainstream use. However, in environments where legacy systems running these specific versions of FreeBSD or Debian Linux are still operational, the vulnerability could allow local users to access or modify sensitive archive files created by cpio. This could lead to unauthorized disclosure of sensitive data or tampering with archived files, potentially undermining data integrity and confidentiality. In multi-user systems, such as shared servers or development environments, this could increase the risk of insider threats or accidental data exposure. The vulnerability does not affect availability and does not allow remote exploitation, limiting its broader impact on organizational operations.

Mitigation Recommendations

Given the absence of official patches, European organizations should consider the following practical mitigation steps: 1) Upgrade affected systems to supported and patched versions of the operating system where this vulnerability is resolved or the umask behavior is corrected. 2) Restrict local user access on systems running vulnerable versions to trusted personnel only, minimizing the risk of exploitation. 3) Avoid using cpio with the -O or -F options on vulnerable systems, or use alternative archiving tools that do not exhibit this behavior. 4) Implement file system permissions and access controls to limit the ability of local users to read or write to directories where cpio archives are created. 5) Monitor and audit usage of cpio and related file creation activities to detect any unusual or unauthorized operations. 6) For legacy systems that cannot be upgraded, consider isolating them from sensitive data and critical network segments to reduce risk exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de4f5

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:54:49 AM

Last updated: 7/26/2025, 9:45:46 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats