Skip to main content

CVE-1999-0213: libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.

High
VulnerabilityCVE-1999-0213cve-1999-0213denial of service
Published: Wed Jul 15 1998 (07/15/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:11:48 UTC

Technical Analysis

CVE-1999-0213 is a high-severity vulnerability affecting the libnsl library in Solaris operating systems, specifically versions 2.6, 5.4, 5.5, and 5.5.1. The vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition against the rpcbind service. Rpcbind is a critical component in Solaris that maps RPC program numbers to network addresses, enabling remote procedure calls to function correctly. Exploiting this vulnerability involves sending crafted requests to the rpcbind service, triggering a failure or crash that disrupts its operation. Since rpcbind is essential for many network services relying on RPC, its unavailability can lead to widespread service interruptions. The CVSS score of 10 (critical) reflects the vulnerability's ease of exploitation (network vector, no authentication required) and its impact on confidentiality, integrity, and availability. Notably, no patch is available for this vulnerability, and no known exploits have been reported in the wild, likely due to the age of the affected Solaris versions. However, systems still running these legacy versions remain at risk if exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Solaris systems are still in use, particularly in critical infrastructure or enterprise environments that rely on RPC services. A successful DoS attack on rpcbind would disrupt dependent services, potentially halting business operations, affecting availability of internal applications, and causing operational downtime. Confidentiality and integrity impacts are also indicated by the CVSS vector, suggesting that the vulnerability might allow broader exploitation beyond DoS, although the primary documented effect is service disruption. Given the age of the vulnerability, most modern environments will not be affected; however, organizations in sectors with long hardware/software lifecycles (e.g., telecommunications, manufacturing, government) may still run vulnerable Solaris versions. The lack of a patch means that mitigation relies on compensating controls rather than direct remediation, increasing operational risk.

Mitigation Recommendations

Since no patch is available, European organizations should implement specific mitigations to reduce exposure. First, isolate legacy Solaris systems running affected versions from untrusted networks using network segmentation and strict firewall rules to block access to rpcbind (port 111 TCP/UDP) from outside trusted zones. Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious RPC traffic patterns targeting rpcbind. Consider disabling rpcbind if RPC services are not required or migrating critical services to supported, patched platforms. Regularly audit network configurations and system inventories to identify and document any Solaris systems running vulnerable versions. Additionally, implement strict access controls and network-level authentication mechanisms to limit who can communicate with rpcbind services. Finally, develop incident response plans specifically addressing potential DoS attacks on legacy systems to minimize operational impact.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea36

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 7:11:48 PM

Last updated: 8/15/2025, 1:39:08 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats