Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0001: ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of servic

0
Medium
VulnerabilityCVE-1999-0001cve-1999-0001denial of servicecwe-20
Published: Thu Dec 30 1999 (12/30/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: bsdi
Product: bsd_os

Description

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:09:57 UTC

Technical Analysis

CVE-1999-0001 is a vulnerability found in the ip_input.c component of BSD-derived TCP/IP implementations. This vulnerability allows remote attackers to cause a denial of service (DoS) condition by sending specially crafted IP packets to the affected system. The flaw resides in the way the BSD TCP/IP stack processes incoming IP packets, which can lead to a system crash or hang, effectively disrupting network services. The affected versions include a broad range of BSD operating system releases from early versions such as 1.0 through to 3.1, indicating this is a legacy vulnerability dating back to the late 1990s. The vulnerability requires no authentication and can be exploited remotely over the network, making it accessible to any attacker capable of sending IP packets to the target system. The CVSS score of 5.0 (medium severity) reflects that while the impact is limited to availability (denial of service), there is no direct impact on confidentiality or integrity. No patches are available for this vulnerability, likely due to the age of the affected systems and the fact that these versions are no longer maintained. There are no known exploits in the wild, which may be due to the obsolescence of the affected BSD versions. The underlying weakness is categorized under CWE-20, which relates to improper input validation, highlighting that the TCP/IP stack does not properly validate crafted packets before processing them.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of network services on systems running the affected BSD versions. Although these BSD versions are largely legacy and not commonly used in modern production environments, some specialized or legacy systems in critical infrastructure, research institutions, or niche industries might still operate them. A successful denial of service attack could lead to temporary loss of network connectivity or service outages, impacting business operations, communications, or availability of critical applications. Given the lack of patches and the age of the vulnerability, organizations relying on these systems may face challenges in remediation. However, the absence of known exploits and the medium severity rating reduce the urgency for most modern enterprises. Still, any legacy system exposure to untrusted networks increases risk, especially if these systems are part of critical network infrastructure or serve as gateways.

Mitigation Recommendations

Since no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Identify and inventory any legacy BSD systems running affected versions to assess exposure. 2) Isolate these systems from untrusted networks, ideally placing them behind firewalls or network segmentation to restrict incoming IP traffic. 3) Implement strict ingress filtering to block malformed or suspicious IP packets at network boundaries. 4) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous IP packet patterns that could exploit this vulnerability. 5) Where possible, upgrade or replace legacy BSD systems with supported, modern operating systems that have patched TCP/IP stacks. 6) Monitor network traffic and system logs for signs of attempted exploitation or unusual crashes/hangs. These steps reduce the attack surface and limit the ability of remote attackers to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df5a7

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:09:57 PM

Last updated: 2/6/2026, 5:21:05 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats