Skip to main content

CVE-2000-0030: Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /v

Medium
VulnerabilityCVE-2000-0030cve-2000-0030
Published: Wed Dec 22 1999 (12/22/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:27:45 UTC

Technical Analysis

CVE-2000-0030 is a medium-severity vulnerability affecting the Solaris operating system versions 5.7 and 7.0. The vulnerability resides in the dmispd daemon, specifically in the dmi_cmd component, which is responsible for managing the Desktop Management Interface (DMI) database located at /var/dmi/db. Local users can exploit this vulnerability by adding files to the DMI database, thereby filling up restricted disk space. This can lead to a denial of service condition by exhausting disk resources critical for system operations. The vulnerability does not allow for unauthorized access, data modification, or data disclosure but impacts system availability by potentially preventing legitimate processes from writing to disk. The CVSS score of 5.0 (medium) reflects that the attack vector is local (AV:N), requires no authentication (Au:N), has low attack complexity (AC:L), and impacts availability only (A:P) without affecting confidentiality or integrity. No patch is available for this vulnerability, and there are no known exploits in the wild. The vulnerability is dated from 1999, indicating it affects legacy Solaris systems that may still be in use in some environments.

Potential Impact

For European organizations still operating legacy Solaris 5.7 or 7.0 systems, this vulnerability poses a risk of local denial of service by disk space exhaustion. This can disrupt critical services dependent on these systems, especially in sectors such as telecommunications, finance, and government where Solaris historically had a strong presence. The inability to write to disk can cause application failures, logging interruptions, and potentially system crashes or degraded performance. While the vulnerability requires local user access, insider threats or compromised accounts could exploit it to degrade system availability. Given the age of the vulnerability and lack of patch, organizations relying on these Solaris versions face operational risks and may find remediation challenging. The impact is primarily on availability, which could affect business continuity and service level agreements.

Mitigation Recommendations

Since no official patch is available, European organizations should implement strict access controls to limit local user permissions on Solaris systems, especially restricting access to the dmispd daemon and the /var/dmi/db directory. Monitoring disk usage and setting disk quotas can help detect and prevent disk space exhaustion. Employing host-based intrusion detection systems to alert on unusual file creation or disk usage patterns in the DMI database directory is recommended. Organizations should consider migrating from legacy Solaris versions to supported, patched operating systems to eliminate this and other legacy vulnerabilities. Additionally, auditing and hardening local user accounts, disabling unnecessary services, and applying principle of least privilege will reduce the risk of exploitation. Regular backups and incident response plans should be in place to mitigate potential availability impacts.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df54a

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:27:45 PM

Last updated: 7/31/2025, 4:19:22 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats