Skip to main content

CVE-1999-0128: Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.

Medium
VulnerabilityCVE-1999-0128cve-1999-0128denial of service
Published: Wed Dec 18 1996 (12/18/1996, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: osf_1

Description

Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:28:12 UTC

Technical Analysis

CVE-1999-0128, commonly known as the Ping of Death vulnerability, is a denial of service (DoS) vulnerability that arises from the processing of oversized ICMP (Internet Control Message Protocol) echo request packets, or ping packets. Specifically, this vulnerability affects the Digital Equipment Corporation's OSF/1 operating system versions ranging from 1.0 through 5.5.1, including multiple intermediate releases. The core issue is that the affected systems do not properly handle ICMP packets that exceed the maximum allowed size (typically 65,535 bytes). When such oversized packets are received, the system attempts to reassemble them into a buffer that is too small, causing memory corruption, system crashes, or reboots, effectively denying service to legitimate users. The vulnerability was published in 1996 and has a CVSS v2 base score of 5.0, indicating a medium severity level. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). It impacts availability (A:P) but does not affect confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild currently. The vulnerability is historic but remains relevant in legacy systems that may still be operational in some environments. The Ping of Death is a classic example of how improper input validation and buffer management can lead to critical system failures.

Potential Impact

For European organizations, the impact of CVE-1999-0128 is primarily related to availability disruptions. If legacy systems running affected versions of OSF/1 are still in use, an attacker could send oversized ICMP packets to cause system crashes or reboots, leading to service interruptions. This could affect critical infrastructure, industrial control systems, or legacy network devices that have not been updated or replaced. Although modern systems and networks have largely mitigated this vulnerability, some specialized or isolated environments in Europe might still rely on older OSF/1 installations, especially in sectors with long hardware lifecycles such as manufacturing, telecommunications, or government agencies. The denial of service could result in operational downtime, loss of productivity, and potential cascading effects on dependent systems. However, the lack of known exploits and the age of the vulnerability reduce the likelihood of widespread impact in contemporary European IT environments.

Mitigation Recommendations

Given that no patches are available for this vulnerability, mitigation must focus on network-level controls and system upgrades. European organizations should: 1) Identify and inventory any legacy systems running affected OSF/1 versions and plan for their upgrade or replacement with supported operating systems. 2) Implement network filtering to block or rate-limit oversized ICMP packets at perimeter firewalls and intrusion prevention systems to prevent malicious oversized ping packets from reaching vulnerable hosts. 3) Disable ICMP echo responses on systems where ping functionality is not required, reducing the attack surface. 4) Employ network segmentation to isolate legacy systems from general network traffic, limiting exposure. 5) Monitor network traffic for anomalous ICMP packet sizes and patterns indicative of attempted exploitation. 6) Educate network administrators about this historic vulnerability to ensure legacy systems are not overlooked in security assessments.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de57b

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:28:12 AM

Last updated: 8/5/2025, 10:18:41 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats