Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0258: Bonk variation of teardrop IP fragmentation denial of service.

0
Medium
VulnerabilityCVE-1999-0258cve-1999-0258denial of service
Published: Fri Feb 13 1998 (02/13/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Bonk variation of teardrop IP fragmentation denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:40:51 UTC

Technical Analysis

CVE-1999-0258 refers to a vulnerability known as the 'Bonk' variation of the teardrop IP fragmentation denial of service (DoS) attack. This vulnerability affects the IP fragmentation reassembly process in Microsoft Windows 95. The teardrop attack exploits flaws in how fragmented IP packets are reassembled by sending overlapping or malformed fragments. In the case of the Bonk variant, specially crafted IP fragments cause the target system's TCP/IP stack to malfunction, leading to a system crash or reboot, effectively causing a denial of service. This vulnerability does not impact confidentiality or integrity but directly affects availability by crashing the affected system. The attack requires no authentication and can be launched remotely over the network with low complexity, as it only involves sending malformed IP packets. The vulnerability was published in 1998 and has a CVSS v2 score of 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P, indicating network attack vector, low attack complexity, no authentication, no confidentiality or integrity impact, but partial availability impact. No patches are available for this vulnerability, and there are no known exploits in the wild currently. However, given the age of the vulnerability and the affected product (Windows 95), it is largely obsolete in modern environments.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95 in enterprise and operational environments. However, if legacy systems running Windows 95 or similarly vulnerable TCP/IP stacks are still in use—such as in industrial control systems, embedded devices, or legacy network equipment—there is a risk of denial of service through network-based attacks causing system crashes. This could disrupt critical services or operations relying on such legacy infrastructure. The attack does not compromise data confidentiality or integrity but can cause temporary unavailability, which might affect business continuity or safety-critical processes. Given the lack of patches and the nature of the vulnerability, mitigation relies on network-level controls and system upgrades. The threat is more relevant in environments where legacy systems are still connected to untrusted networks or the internet.

Mitigation Recommendations

1. Upgrade or replace legacy Windows 95 systems with modern, supported operating systems that have patched TCP/IP stacks. 2. Implement network-level filtering to block malformed or suspicious IP fragments at perimeter firewalls or intrusion prevention systems (IPS). Specifically, configure network devices to detect and drop overlapping or malformed IP fragments that resemble teardrop or Bonk attack patterns. 3. Segment legacy systems from general network traffic using VLANs or air-gapping to reduce exposure. 4. Employ network anomaly detection tools to monitor for unusual fragmentation patterns indicative of an attack. 5. Where upgrading is not immediately feasible, consider disabling IP fragmentation reassembly if possible or applying host-based firewall rules to limit exposure. 6. Maintain strict network access controls and monitor logs for signs of repeated malformed packet attempts. These steps go beyond generic advice by focusing on network-level defenses and legacy system isolation, which are critical given the absence of patches.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de8fc

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:40:51 PM

Last updated: 2/7/2026, 11:43:35 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats