First published: Fri Jan 01 1999(Updated: )
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux Kernel | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0656 is considered a high severity vulnerability due to its potential for username enumeration by remote attackers.
To mitigate CVE-1999-0656, you should disable the ugidd RPC interface if it is not needed, or apply security patches provided by your Linux distribution.
CVE-1999-0656 affects systems running vulnerable versions of the Linux kernel that utilize the ugidd RPC interface.
The impact of CVE-1999-0656 is that it allows remote attackers to enumerate valid usernames on the system, potentially leading to further exploitation.
While CVE-1999-0656 is an older vulnerability, it can still be a concern for legacy systems or unattended environments using affected versions of the Linux kernel.