Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0052: IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.

0
High
VulnerabilityCVE-1999-0052cve-1999-0052denial of servicecwe-476
Published: Wed Nov 04 1998 (11/04/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: bsdi
Product: bsd_os

Description

IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/29/2025, 13:10:38 UTC

Technical Analysis

CVE-1999-0052 is a high-severity vulnerability affecting multiple versions of the FreeBSD operating system, specifically versions ranging from 1.1.5.1 through 4.0 and various intermediate releases. The vulnerability arises from improper handling of IP fragmentation, which allows a remote attacker to send specially crafted fragmented IP packets that cause the target FreeBSD system to crash, resulting in a denial of service (DoS). The root cause is related to a null pointer dereference (CWE-476), which leads to system instability and a forced reboot or crash. This vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it particularly dangerous for systems exposed to untrusted networks. The CVSS 3.1 base score of 7.5 reflects a high severity, with the attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but a high impact on availability (A:H). No patches are available for this vulnerability, and there are no known exploits in the wild, likely due to the age of the affected software versions. However, the vulnerability remains relevant for legacy FreeBSD systems that may still be in operation in certain environments.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on availability. Systems running affected FreeBSD versions could be remotely crashed by attackers, causing service interruptions, potential data loss during crashes, and operational downtime. This is particularly critical for organizations relying on legacy FreeBSD systems for network infrastructure, embedded devices, or specialized applications. The lack of patches means that mitigation must rely on network-level controls or system upgrades. Disruption of critical services such as web hosting, VPN gateways, or internal network routing could have cascading effects on business continuity. Additionally, the vulnerability could be exploited as part of a larger attack campaign to degrade network infrastructure or distract security teams. Although modern FreeBSD versions are not affected, some industrial or governmental entities in Europe might still operate legacy systems, increasing their risk exposure.

Mitigation Recommendations

Given the absence of patches, European organizations should prioritize upgrading affected FreeBSD systems to supported, patched versions that do not contain this vulnerability. If upgrading is not immediately feasible, network-level mitigations should be implemented, such as deploying intrusion prevention systems (IPS) or firewalls capable of detecting and blocking suspicious fragmented IP packets. Configuring network devices to drop malformed or suspicious fragments can reduce exposure. Additionally, organizations should segment legacy FreeBSD systems from untrusted networks and restrict access to trusted management networks only. Monitoring network traffic for unusual fragmentation patterns can provide early warning of exploitation attempts. Finally, organizations should conduct an inventory of all FreeBSD systems to identify any legacy versions still in use and plan for their replacement or isolation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32bb6fd31d6ed7deb0f

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 1:10:38 PM

Last updated: 3/25/2026, 1:37:32 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses