Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0171: Denial of service in syslog by sending it a large number of superfluous messages.

0
Low
VulnerabilityCVE-1999-0171cve-1999-0171denial of service
Published: Wed Jan 01 1997 (01/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

Denial of service in syslog by sending it a large number of superfluous messages.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:27:32 UTC

Technical Analysis

CVE-1999-0171 is a denial of service (DoS) vulnerability affecting the syslog component of the Linux kernel version 2.6.20.1. The vulnerability arises when an attacker sends a large number of superfluous or excessive syslog messages, overwhelming the syslog service. Syslog is a critical system logging facility used to record system events, errors, and informational messages. Excessive logging can exhaust system resources such as CPU, memory, or disk I/O, leading to degraded system performance or complete unavailability of the logging service. This can indirectly affect system stability and the ability to monitor or audit system activities. The vulnerability does not impact confidentiality or integrity, as it only affects availability. Exploitation requires local access (AV:L - Attack Vector: Local) but no authentication (Au:N), and the attack complexity is low (AC:L). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The CVSS score is 2.1, indicating a low severity level. Given the age of this vulnerability and the specific affected version, modern Linux systems are unlikely to be impacted. However, legacy systems running this exact kernel version or similar may still be vulnerable to resource exhaustion via syslog flooding.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to its limited severity and the requirement for local access to exploit it. However, organizations running legacy Linux systems with kernel version 2.6.20.1 or similar could experience denial of service conditions on critical servers if an attacker floods syslog with excessive messages. This could disrupt system monitoring and logging, impairing incident detection and response capabilities. In sectors where continuous system availability and auditing are critical—such as finance, healthcare, and critical infrastructure—this could pose operational risks. Additionally, if attackers gain local access through other means, they could leverage this vulnerability to degrade system performance or cause service interruptions. Overall, the threat is limited by the need for local access and the low severity, but legacy systems in European organizations should be assessed for exposure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory systems running Linux kernel version 2.6.20.1 or similarly vulnerable versions. 2) Upgrade or patch affected systems to more recent, supported Linux kernel versions where this vulnerability is resolved or syslog implementations are hardened against flooding. 3) Implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation. 4) Configure syslog rate limiting or message throttling features where available to prevent resource exhaustion from excessive logging. 5) Monitor system logs and resource usage for unusual spikes in syslog message volume that could indicate attempted exploitation. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous local activity that may precede or accompany exploitation attempts. 7) For legacy systems that cannot be upgraded, isolate them in secure network segments and restrict user access to minimize risk.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de59a

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:27:32 AM

Last updated: 2/7/2026, 8:22:12 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats