Skip to main content

CVE-2000-0458: The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows o

Low
VulnerabilityCVE-2000-0458cve-2000-0458
Published: Sat Apr 22 2000 (04/22/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: imp
Product: imp

Description

The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information.

AI-Powered Analysis

AILast updated: 06/19/2025, 20:18:00 UTC

Technical Analysis

CVE-2000-0458 is a vulnerability found in the MSWordView application component of the IMP (Internet Messaging Program) software, specifically in versions 2.0.9, 2.0.10, 2.0.11, 2.2_pre9, and 2.2_pre10. The issue arises because MSWordView creates temporary files in the /tmp directory with world-readable permissions. This means that any local user on the affected system can read these files, potentially exposing sensitive information such as email content or document data that the application processes. The vulnerability is a local information disclosure flaw, as it requires local access to the system and does not allow modification or disruption of data or services. The CVSS score of 2.1 (low severity) reflects that the impact is limited to confidentiality, with no impact on integrity or availability. Exploitation does not require authentication but does require local access, and no user interaction beyond running the vulnerable application is needed. No patches or fixes are available for this vulnerability, and there are no known exploits in the wild. The vulnerability is primarily a privacy risk in multi-user environments where untrusted users share the same system, such as shared servers or workstations.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to confidentiality breaches in environments where multiple users have local access to the same system. Organizations using IMP versions affected by this vulnerability on shared servers or multi-user systems risk unauthorized disclosure of sensitive email or document content. This could lead to exposure of confidential business communications, personal data, or intellectual property. However, since exploitation requires local access and does not affect system integrity or availability, the overall risk is limited to insider threats or compromised local accounts. The lack of a patch means organizations must rely on mitigating controls. The vulnerability is less likely to impact organizations that use dedicated user environments or have strict local access controls. Given the age of the vulnerability (published in 2000), modern deployments are less likely to be affected, but legacy systems in use within some European organizations could still be vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Restrict local user access on systems running affected IMP versions to trusted personnel only, minimizing the risk of unauthorized local users reading temporary files. 2) Implement strict file system permissions and consider mounting /tmp with the 'noexec' and 'nosuid' options and using access control lists (ACLs) to limit read permissions on temporary files. 3) Use containerization or sandboxing techniques to isolate the IMP application and its temporary files from other users on the system. 4) Where possible, upgrade or replace IMP with more modern, supported mail clients that do not exhibit this vulnerability. 5) Monitor local system access logs for unusual activity that could indicate attempts to access temporary files. 6) If legacy systems must be maintained, consider relocating the /tmp directory to a location with stricter permissions or using tmpfs with controlled access. These steps go beyond generic advice by focusing on local access controls and file system hardening tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7dfa0f

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 8:18:00 PM

Last updated: 7/31/2025, 6:51:11 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats