CVE-2000-0387: The makelev program in the golddig game from the FreeBSD ports collection allows local users to over
The makelev program in the golddig game from the FreeBSD ports collection allows local users to overwrite arbitrary files.
AI Analysis
Technical Summary
CVE-2000-0387 is a vulnerability found in the makelev program, which is part of the golddig game distributed via the FreeBSD ports collection. The vulnerability allows local users to overwrite arbitrary files on the system. Specifically, the flaw exists in version 2.0 of golddig, where the makelev utility does not properly restrict file write operations, enabling a local attacker to overwrite files outside the intended scope. This can lead to modification of critical system or user files, potentially altering system behavior or corrupting data. The vulnerability requires local access to the system, meaning an attacker must already have some level of access to exploit it. The CVSS score is 2.1, indicating a low severity level, with the vector AV:L/AC:L/Au:N/C:N/I:P/A:N. This means the attack vector is local, attack complexity is low, no authentication is required beyond local access, confidentiality impact is none, integrity impact is partial, and availability impact is none. There are no known exploits in the wild, and no patches are available for this vulnerability. Given the age of the vulnerability (published in 2000) and the niche nature of the golddig game, this issue is primarily a local privilege or file integrity concern rather than a widespread threat. However, it could be leveraged in multi-stage attacks where local access is already obtained, to escalate privileges or maintain persistence by overwriting critical files.
Potential Impact
For European organizations, the direct impact of this vulnerability is limited due to its low severity and requirement for local access. However, in environments where FreeBSD systems are used and the golddig game (version 2.0) is installed, this vulnerability could allow malicious insiders or attackers who have gained limited local access to modify arbitrary files. This could compromise system integrity, potentially leading to unauthorized changes in system configurations or application behavior. While it does not impact confidentiality or availability directly, the integrity compromise could facilitate further attacks or disrupt operations. Given that golddig is a relatively obscure game and not commonly deployed in enterprise environments, the overall risk to European organizations is low. Nonetheless, organizations with FreeBSD-based infrastructure should be aware of this vulnerability as part of their local security posture, especially in sensitive environments where local user access is possible.
Mitigation Recommendations
Since no official patch is available, organizations should consider the following specific mitigations: 1) Remove or uninstall the golddig game and associated utilities like makelev from all FreeBSD systems where it is not explicitly needed, thereby eliminating the attack surface. 2) Restrict local user access on FreeBSD systems to trusted personnel only, using strict user account management and privilege separation to prevent unauthorized local logins. 3) Employ file integrity monitoring tools to detect unauthorized changes to critical files, which could indicate exploitation attempts. 4) Harden FreeBSD systems by applying the latest security updates and disabling unnecessary services or software, reducing the likelihood of local compromise. 5) If golddig must be used, consider running it in a sandboxed or containerized environment with limited file system permissions to contain potential damage. 6) Monitor system logs for suspicious activity related to file modifications or execution of makelev. These targeted steps go beyond generic advice by focusing on the specific vulnerable component and the local nature of the threat.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2000-0387: The makelev program in the golddig game from the FreeBSD ports collection allows local users to over
Description
The makelev program in the golddig game from the FreeBSD ports collection allows local users to overwrite arbitrary files.
AI-Powered Analysis
Technical Analysis
CVE-2000-0387 is a vulnerability found in the makelev program, which is part of the golddig game distributed via the FreeBSD ports collection. The vulnerability allows local users to overwrite arbitrary files on the system. Specifically, the flaw exists in version 2.0 of golddig, where the makelev utility does not properly restrict file write operations, enabling a local attacker to overwrite files outside the intended scope. This can lead to modification of critical system or user files, potentially altering system behavior or corrupting data. The vulnerability requires local access to the system, meaning an attacker must already have some level of access to exploit it. The CVSS score is 2.1, indicating a low severity level, with the vector AV:L/AC:L/Au:N/C:N/I:P/A:N. This means the attack vector is local, attack complexity is low, no authentication is required beyond local access, confidentiality impact is none, integrity impact is partial, and availability impact is none. There are no known exploits in the wild, and no patches are available for this vulnerability. Given the age of the vulnerability (published in 2000) and the niche nature of the golddig game, this issue is primarily a local privilege or file integrity concern rather than a widespread threat. However, it could be leveraged in multi-stage attacks where local access is already obtained, to escalate privileges or maintain persistence by overwriting critical files.
Potential Impact
For European organizations, the direct impact of this vulnerability is limited due to its low severity and requirement for local access. However, in environments where FreeBSD systems are used and the golddig game (version 2.0) is installed, this vulnerability could allow malicious insiders or attackers who have gained limited local access to modify arbitrary files. This could compromise system integrity, potentially leading to unauthorized changes in system configurations or application behavior. While it does not impact confidentiality or availability directly, the integrity compromise could facilitate further attacks or disrupt operations. Given that golddig is a relatively obscure game and not commonly deployed in enterprise environments, the overall risk to European organizations is low. Nonetheless, organizations with FreeBSD-based infrastructure should be aware of this vulnerability as part of their local security posture, especially in sensitive environments where local user access is possible.
Mitigation Recommendations
Since no official patch is available, organizations should consider the following specific mitigations: 1) Remove or uninstall the golddig game and associated utilities like makelev from all FreeBSD systems where it is not explicitly needed, thereby eliminating the attack surface. 2) Restrict local user access on FreeBSD systems to trusted personnel only, using strict user account management and privilege separation to prevent unauthorized local logins. 3) Employ file integrity monitoring tools to detect unauthorized changes to critical files, which could indicate exploitation attempts. 4) Harden FreeBSD systems by applying the latest security updates and disabling unnecessary services or software, reducing the likelihood of local compromise. 5) If golddig must be used, consider running it in a sandboxed or containerized environment with limited file system permissions to contain potential damage. 6) Monitor system logs for suspicious activity related to file modifications or execution of makelev. These targeted steps go beyond generic advice by focusing on the specific vulnerable component and the local nature of the threat.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7dfabd
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/19/2025, 7:35:21 PM
Last updated: 7/28/2025, 7:33:46 AM
Views: 10
Related Threats
CVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-36581: CWE-788: Access of Memory Location After End of Buffer in Dell PowerEdge
LowCVE-2025-8713: Exposure of Sensitive Information Through Metadata in PostgreSQL
LowCVE-2025-5941: CWE-125 Out-of-Bounds Read in Netskope Netskope Client
LowCVE-2025-53859: CWE-125 Out-of-bounds Read in F5 NGINX Plus
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.