Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0244: Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root.

0
High
VulnerabilityCVE-1999-0244cve-1999-0244buffer overflow
Published: Mon Dec 01 1997 (12/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: livingston
Product: radius

Description

Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:55:30 UTC

Technical Analysis

CVE-1999-0244 is a high-severity vulnerability affecting Livingston RADIUS server software version 1.x. The vulnerability arises from a buffer overflow in the Livingston RADIUS code, which can be exploited remotely without authentication. An attacker can send specially crafted packets to the RADIUS server, triggering the buffer overflow and enabling arbitrary command execution with root privileges. This means the attacker gains full control over the affected system, compromising confidentiality, integrity, and availability. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L), making it relatively easy to exploit if the vulnerable service is exposed. The impact includes potential full system takeover, data theft, service disruption, or use of the compromised system as a pivot point for further attacks. Despite the age of this vulnerability (published in 1997), it remains relevant for legacy systems still running Livingston RADIUS 1.x. No patches are available, increasing the risk for unmitigated systems. Organizations relying on this software should consider immediate mitigation steps or migration to supported RADIUS implementations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if Livingston RADIUS 1.x is still in use, particularly in network authentication infrastructure. Compromise of RADIUS servers can lead to unauthorized access to corporate networks, exposure of sensitive authentication data, and disruption of network services. This can affect sectors with critical infrastructure such as telecommunications, finance, and government agencies. The ability to execute commands as root means attackers can fully control affected servers, potentially leading to lateral movement within networks and data breaches. Given the lack of patches, organizations face a persistent risk if they have not migrated to newer, supported RADIUS solutions. The exposure of authentication infrastructure can undermine trust in network security and compliance with European data protection regulations such as GDPR.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Immediate identification and inventory of any Livingston RADIUS 1.x deployments within their networks. 2) Isolate or remove vulnerable RADIUS servers from internet-facing positions to reduce exposure. 3) Replace Livingston RADIUS 1.x with modern, actively maintained RADIUS implementations that have current security support. 4) Employ network segmentation and strict firewall rules to limit access to RADIUS servers only to trusted internal systems. 5) Monitor network traffic for unusual RADIUS requests or signs of exploitation attempts. 6) Implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting buffer overflow attempts against RADIUS services. 7) Conduct regular security audits and penetration tests focusing on authentication infrastructure. These steps go beyond generic advice by focusing on legacy system identification, network isolation, and active monitoring tailored to this specific vulnerability and product.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de87a

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:55:30 AM

Last updated: 2/7/2026, 12:41:45 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats