
17/9/1993

9/3/2002

20/11/2024
CVE-1999-1138
First published: Fri Sep 17 1993(Updated: )
SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
SCO Open Desktop | =1.0 | |
SCO Open Desktop | =2.0 | |
SCO Open Desktop | =3.0 | |
SCO OpenDesktop Lite | =3.0 | |
Xinuos OpenServer | =3.0 | |
UNIX | =system_v386_3.2_operating_system | |
UNIX | =system_v386_3.2_operating_system_2.0 | |
UNIX | =system_v386_3.2_operating_system_4.0 | |
UNIX | =system_v386_3.2_operating_system_4.x | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-1999-1138?
CVE-1999-1138 is classified as a high severity vulnerability due to its ability to allow unauthorized access to user accounts.
How do I fix CVE-1999-1138?
To mitigate CVE-1999-1138, ensure that the /tmp and /usr/tmp directories are not set to be world-writable.
What products are affected by CVE-1999-1138?
CVE-1999-1138 affects SCO UNIX System V/386 Release 3.2 and various versions of SCO Open Desktop and OpenServer.
What are the risks associated with CVE-1999-1138?
The main risk of CVE-1999-1138 is that other users can gain unauthorized access to sensitive data in the home directories of affected accounts.
Is there a workaround for CVE-1999-1138?
A possible workaround for CVE-1999-1138 is to change the permissions of the /tmp and /usr/tmp directories to prevent public access.
- agent/references
- agent/type
- agent/first-publish-date
- collector/mitre-cve
- source/MITRE
- agent/weakness
- agent/severity
- agent/description
- agent/last-modified-date
- agent/author
- agent/event
- agent/source
- agent/softwarecombine
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- collector/nvd-historical
- vendor/sco
- canonical/sco open desktop
- version/sco open desktop/1.0
- version/sco open desktop/2.0
- version/sco open desktop/3.0
- canonical/sco opendesktop lite
- version/sco opendesktop lite/3.0
- canonical/xinuos openserver
- version/xinuos openserver/3.0
- canonical/unix
- version/unix/system_v386_3.2_operating_system
- version/unix/system_v386_3.2_operating_system_2.0
- version/unix/system_v386_3.2_operating_system_4.0
- version/unix/system_v386_3.2_operating_system_4.x
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203