Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0128: Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.

0
Medium
VulnerabilityCVE-1999-0128cve-1999-0128denial of service
Published: Wed Dec 18 1996 (12/18/1996, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: osf_1

Description

Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:28:12 UTC

Technical Analysis

CVE-1999-0128, commonly known as the Ping of Death vulnerability, is a denial of service (DoS) vulnerability that arises from the processing of oversized ICMP (Internet Control Message Protocol) echo request packets, or ping packets. Specifically, this vulnerability affects the Digital Equipment Corporation's OSF/1 operating system versions ranging from 1.0 through 5.5.1, including multiple intermediate releases. The core issue is that the affected systems do not properly handle ICMP packets that exceed the maximum allowed size (typically 65,535 bytes). When such oversized packets are received, the system attempts to reassemble them into a buffer that is too small, causing memory corruption, system crashes, or reboots, effectively denying service to legitimate users. The vulnerability was published in 1996 and has a CVSS v2 base score of 5.0, indicating a medium severity level. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). It impacts availability (A:P) but does not affect confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild currently. The vulnerability is historic but remains relevant in legacy systems that may still be operational in some environments. The Ping of Death is a classic example of how improper input validation and buffer management can lead to critical system failures.

Potential Impact

For European organizations, the impact of CVE-1999-0128 is primarily related to availability disruptions. If legacy systems running affected versions of OSF/1 are still in use, an attacker could send oversized ICMP packets to cause system crashes or reboots, leading to service interruptions. This could affect critical infrastructure, industrial control systems, or legacy network devices that have not been updated or replaced. Although modern systems and networks have largely mitigated this vulnerability, some specialized or isolated environments in Europe might still rely on older OSF/1 installations, especially in sectors with long hardware lifecycles such as manufacturing, telecommunications, or government agencies. The denial of service could result in operational downtime, loss of productivity, and potential cascading effects on dependent systems. However, the lack of known exploits and the age of the vulnerability reduce the likelihood of widespread impact in contemporary European IT environments.

Mitigation Recommendations

Given that no patches are available for this vulnerability, mitigation must focus on network-level controls and system upgrades. European organizations should: 1) Identify and inventory any legacy systems running affected OSF/1 versions and plan for their upgrade or replacement with supported operating systems. 2) Implement network filtering to block or rate-limit oversized ICMP packets at perimeter firewalls and intrusion prevention systems to prevent malicious oversized ping packets from reaching vulnerable hosts. 3) Disable ICMP echo responses on systems where ping functionality is not required, reducing the attack surface. 4) Employ network segmentation to isolate legacy systems from general network traffic, limiting exposure. 5) Monitor network traffic for anomalous ICMP packet sizes and patterns indicative of attempted exploitation. 6) Educate network administrators about this historic vulnerability to ensure legacy systems are not overlooked in security assessments.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de57b

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:28:12 AM

Last updated: 2/3/2026, 1:01:13 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats