Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0054: Sun's ftpd daemon can be subjected to a denial of service.

0
Medium
VulnerabilityCVE-1999-0054cve-1999-0054denial of service
Published: Wed Jun 10 1998 (06/10/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

Sun's ftpd daemon can be subjected to a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:11:37 UTC

Technical Analysis

CVE-1999-0054 is a medium-severity vulnerability affecting Sun Microsystems' ftpd daemon on Solaris operating systems, specifically versions 2.4 through 5.5.1. The vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition against the ftpd service. The ftpd daemon, responsible for handling FTP connections, can be overwhelmed or crashed by specially crafted network packets or malformed FTP requests, leading to service disruption. The vulnerability does not impact confidentiality or integrity but solely affects availability. The CVSS base score of 5.0 reflects that the attack vector is network-based (AV:N), requires no authentication (Au:N), has low attack complexity (AC:L), and results in a partial loss of availability (A:P). No patches or fixes are available, and there are no known exploits in the wild, likely due to the age of the vulnerability and the obsolescence of the affected Solaris versions. However, legacy systems still running these Solaris versions with active ftpd services remain susceptible to DoS attacks that could disrupt FTP-based file transfers or automated processes relying on FTP.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of FTP services on legacy Solaris systems. FTP is often used for file transfers in industrial, governmental, or research environments where Solaris systems might still be operational. A successful DoS attack could interrupt business operations, delay data exchange, or impact critical workflows dependent on FTP. While the vulnerability does not allow data theft or system compromise, the loss of availability could have operational and reputational consequences, especially in sectors requiring high availability or strict service-level agreements. Given the age of the vulnerability and Solaris versions affected, the impact is limited to organizations that have not migrated to modern platforms or protocols. Additionally, the lack of patches means organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Disable the ftpd service on Solaris systems if it is not strictly necessary, or replace it with a more secure and actively maintained FTP server. 2) Restrict network access to the ftpd service using firewall rules or network segmentation to limit exposure only to trusted hosts and networks. 3) Monitor network traffic for unusual FTP connection patterns or repeated malformed requests that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block DoS attempts targeting ftpd. 5) Plan and execute migration away from legacy Solaris versions to supported operating systems with updated, secure FTP implementations or alternative secure file transfer protocols such as SFTP or FTPS. 6) Maintain regular backups and incident response plans to quickly recover from potential service disruptions.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de9d9

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:11:37 PM

Last updated: 2/7/2026, 7:07:25 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats