| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Coast SATAN 1.1.1. It has been classified as problematic. This affects an unknown part of the file /tmp/rex.$. The manipulation leads to race condition. This vulnerability is traded as CVE-1999-1037. There is no exploit available. Due to its background and reception, this vulnerability has an historic impact. Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as critical, has been found in Coast SATAN 1.1.1. This issue affects an unknown code block of the file /tmp/rex.$. The manipulation with an unknown input leads to a race condition vulnerability. Using CWE to declare the problem leads to CWE-362. The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.
The weakness was shared 06/26/1998 as not defined posting (Bugtraq). It is possible to read the advisory at marc.theaimsgroup.com. The identification of this vulnerability is CVE-1999-1037. The exploitation is known to be easy. Attacking locally is a requirement. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 04/17/2026). Due to its background and reception, this vulnerability has a historic impact.
After 2 days, there has been an exploit disclosed. It is declared as highly functional.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (7167) and OSVDB (3147†). The entries VDB-14158 and VDB-14160 are related to this item. Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.4VulDB Meta Temp Score: 8.0
VulDB Base Score: 8.4
VulDB Temp Score: 8.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Race conditionCWE: CWE-362
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
06/26/1998 🔍06/26/1998 🔍
06/28/1998 🔍
12/23/2003 🔍
06/19/2014 🔍
04/17/2026 🔍
Sources
Advisory: marc.theaimsgroup.comStatus: Confirmed
CVE: CVE-1999-1037 (🔍)
GCVE (CVE): GCVE-0-1999-1037
GCVE (VulDB): GCVE-100-14159
X-Force: 7167 - SATAN rex.satan file symlink attack
OSVDB: 3147 - SATAN Temporary File Race Condition and Symlink
See also: 🔍
Entry
Created: 06/19/2014 16:01Updated: 04/17/2026 13:21
Changes: 06/19/2014 16:01 (49), 05/19/2018 09:56 (8), 04/17/2026 13:21 (18)
Complete: 🔍
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.