Skip to main content

CVE-2000-0076: nviboot boot script in the Debian nvi package allows local users to delete files via malformed entri

Low
VulnerabilityCVE-2000-0076cve-2000-0076
Published: Thu Dec 30 1999 (12/30/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: berkeley
Product: nvi

Description

nviboot boot script in the Debian nvi package allows local users to delete files via malformed entries in vi.recover.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:09:44 UTC

Technical Analysis

CVE-2000-0076 is a vulnerability found in the nviboot boot script component of the Debian nvi package, specifically affecting versions 1.7x and 2.1. The nvi package is a re-implementation of the classic vi text editor, commonly used in Unix-like systems. The vulnerability arises from the way the nviboot script processes entries in the vi.recover file, which is used to recover unsaved changes after an editor crash. Malformed entries in this recovery file can be crafted by a local user to exploit the script's handling logic, allowing them to delete arbitrary files on the system. This deletion capability stems from improper validation or sanitization of the recovery entries, which the boot script uses to perform file operations. The attack vector requires local access, meaning the attacker must already have some level of access to the system to exploit this vulnerability. The CVSS score of 2.1 (low severity) reflects that the vulnerability impacts integrity (file deletion) but does not affect confidentiality or availability, requires local access, and has low complexity for exploitation. No authentication is required beyond local user access, and no known patches or exploits are documented. Given the age of this vulnerability (published in 1999), modern systems are unlikely to be affected unless they run legacy Debian systems with the vulnerable nvi versions installed.

Potential Impact

For European organizations, the impact of this vulnerability is relatively limited due to its low severity and requirement for local access. However, in environments where legacy Debian systems with the vulnerable nvi package versions are still in use, this vulnerability could allow a local attacker to delete critical files, potentially disrupting operations or corrupting important data. This could affect system integrity and complicate incident response or forensic investigations. The risk is higher in organizations with lax internal access controls or where multiple users share system access. Since the vulnerability does not allow remote exploitation, it is less likely to be leveraged in widespread attacks but could be used in targeted insider threat scenarios or by attackers who have already gained limited access to a system.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any systems running the affected versions (1.7x or 2.1) of the nvi package on Debian or Debian-derived distributions. Given that no official patches are available, organizations should consider the following practical steps: 1) Upgrade or replace the nvi package with a more recent, maintained version or switch to alternative text editors such as vim or nano that do not have this vulnerability. 2) Restrict local user access to systems running vulnerable software, enforcing strict user permissions and minimizing the number of users with shell access. 3) Implement file integrity monitoring on critical system files and directories to detect unauthorized deletions or modifications. 4) Regularly audit and clean up vi.recover files to prevent malformed entries from persisting. 5) Employ system hardening best practices, including the use of mandatory access controls (e.g., AppArmor, SELinux) to limit the ability of local users to perform unauthorized file deletions. 6) Educate system administrators and users about the risks of running outdated software and the importance of timely upgrades.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df5ad

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:09:44 PM

Last updated: 8/1/2025, 3:29:11 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats