Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0213: libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.

0
High
VulnerabilityCVE-1999-0213cve-1999-0213denial of service
Published: Wed Jul 15 1998 (07/15/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:11:48 UTC

Technical Analysis

CVE-1999-0213 is a high-severity vulnerability affecting the libnsl library in Solaris operating systems, specifically versions 2.6, 5.4, 5.5, and 5.5.1. The vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition against the rpcbind service. Rpcbind is a critical component in Solaris that maps RPC program numbers to network addresses, enabling remote procedure calls to function correctly. Exploiting this vulnerability involves sending crafted requests to the rpcbind service, triggering a failure or crash that disrupts its operation. Since rpcbind is essential for many network services relying on RPC, its unavailability can lead to widespread service interruptions. The CVSS score of 10 (critical) reflects the vulnerability's ease of exploitation (network vector, no authentication required) and its impact on confidentiality, integrity, and availability. Notably, no patch is available for this vulnerability, and no known exploits have been reported in the wild, likely due to the age of the affected Solaris versions. However, systems still running these legacy versions remain at risk if exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Solaris systems are still in use, particularly in critical infrastructure or enterprise environments that rely on RPC services. A successful DoS attack on rpcbind would disrupt dependent services, potentially halting business operations, affecting availability of internal applications, and causing operational downtime. Confidentiality and integrity impacts are also indicated by the CVSS vector, suggesting that the vulnerability might allow broader exploitation beyond DoS, although the primary documented effect is service disruption. Given the age of the vulnerability, most modern environments will not be affected; however, organizations in sectors with long hardware/software lifecycles (e.g., telecommunications, manufacturing, government) may still run vulnerable Solaris versions. The lack of a patch means that mitigation relies on compensating controls rather than direct remediation, increasing operational risk.

Mitigation Recommendations

Since no patch is available, European organizations should implement specific mitigations to reduce exposure. First, isolate legacy Solaris systems running affected versions from untrusted networks using network segmentation and strict firewall rules to block access to rpcbind (port 111 TCP/UDP) from outside trusted zones. Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious RPC traffic patterns targeting rpcbind. Consider disabling rpcbind if RPC services are not required or migrating critical services to supported, patched platforms. Regularly audit network configurations and system inventories to identify and document any Solaris systems running vulnerable versions. Additionally, implement strict access controls and network-level authentication mechanisms to limit who can communicate with rpcbind services. Finally, develop incident response plans specifically addressing potential DoS attacks on legacy systems to minimize operational impact.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dea36

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 7:11:48 PM

Last updated: 2/7/2026, 5:19:25 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats