Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1572: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask wh

0
Low
VulnerabilityCVE-1999-1572cve-1999-1572
Published: Tue Jul 16 1996 (07/16/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: debian
Product: debian_linux

Description

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:54:49 UTC

Technical Analysis

CVE-1999-1572 is a vulnerability affecting the cpio utility on several Unix-like operating systems, including FreeBSD 2.1.0, Debian GNU/Linux 3.0, and potentially other versions and distributions. The issue arises because cpio uses a zero umask (umask 0) when creating files with the -O (archive output) or -F (specify archive file) options. This results in files being created with permissions set to 0666 (readable and writable by all users). Consequently, any local user on the system can read or overwrite these files, which may lead to unauthorized disclosure of information or modification of archive contents. The vulnerability is local in nature, requiring the attacker to have access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the limited scope and impact. No patches are currently available, and there are no known exploits in the wild. The vulnerability mainly affects older versions of operating systems, some of which are now obsolete, but similar issues could theoretically exist in other versions if the umask behavior is unchanged.

Potential Impact

For European organizations, the impact of this vulnerability is generally low given its local access requirement and the fact that it affects older operating system versions that are largely out of mainstream use. However, in environments where legacy systems running these specific versions of FreeBSD or Debian Linux are still operational, the vulnerability could allow local users to access or modify sensitive archive files created by cpio. This could lead to unauthorized disclosure of sensitive data or tampering with archived files, potentially undermining data integrity and confidentiality. In multi-user systems, such as shared servers or development environments, this could increase the risk of insider threats or accidental data exposure. The vulnerability does not affect availability and does not allow remote exploitation, limiting its broader impact on organizational operations.

Mitigation Recommendations

Given the absence of official patches, European organizations should consider the following practical mitigation steps: 1) Upgrade affected systems to supported and patched versions of the operating system where this vulnerability is resolved or the umask behavior is corrected. 2) Restrict local user access on systems running vulnerable versions to trusted personnel only, minimizing the risk of exploitation. 3) Avoid using cpio with the -O or -F options on vulnerable systems, or use alternative archiving tools that do not exhibit this behavior. 4) Implement file system permissions and access controls to limit the ability of local users to read or write to directories where cpio archives are created. 5) Monitor and audit usage of cpio and related file creation activities to detect any unusual or unauthorized operations. 6) For legacy systems that cannot be upgraded, consider isolating them from sensitive data and critical network segments to reduce risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de4f5

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:54:49 AM

Last updated: 2/7/2026, 10:27:12 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats