Skip to main content

CVE-1999-0258: Bonk variation of teardrop IP fragmentation denial of service.

Medium
VulnerabilityCVE-1999-0258cve-1999-0258denial of service
Published: Fri Feb 13 1998 (02/13/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Bonk variation of teardrop IP fragmentation denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:40:51 UTC

Technical Analysis

CVE-1999-0258 refers to a vulnerability known as the 'Bonk' variation of the teardrop IP fragmentation denial of service (DoS) attack. This vulnerability affects the IP fragmentation reassembly process in Microsoft Windows 95. The teardrop attack exploits flaws in how fragmented IP packets are reassembled by sending overlapping or malformed fragments. In the case of the Bonk variant, specially crafted IP fragments cause the target system's TCP/IP stack to malfunction, leading to a system crash or reboot, effectively causing a denial of service. This vulnerability does not impact confidentiality or integrity but directly affects availability by crashing the affected system. The attack requires no authentication and can be launched remotely over the network with low complexity, as it only involves sending malformed IP packets. The vulnerability was published in 1998 and has a CVSS v2 score of 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P, indicating network attack vector, low attack complexity, no authentication, no confidentiality or integrity impact, but partial availability impact. No patches are available for this vulnerability, and there are no known exploits in the wild currently. However, given the age of the vulnerability and the affected product (Windows 95), it is largely obsolete in modern environments.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95 in enterprise and operational environments. However, if legacy systems running Windows 95 or similarly vulnerable TCP/IP stacks are still in use—such as in industrial control systems, embedded devices, or legacy network equipment—there is a risk of denial of service through network-based attacks causing system crashes. This could disrupt critical services or operations relying on such legacy infrastructure. The attack does not compromise data confidentiality or integrity but can cause temporary unavailability, which might affect business continuity or safety-critical processes. Given the lack of patches and the nature of the vulnerability, mitigation relies on network-level controls and system upgrades. The threat is more relevant in environments where legacy systems are still connected to untrusted networks or the internet.

Mitigation Recommendations

1. Upgrade or replace legacy Windows 95 systems with modern, supported operating systems that have patched TCP/IP stacks. 2. Implement network-level filtering to block malformed or suspicious IP fragments at perimeter firewalls or intrusion prevention systems (IPS). Specifically, configure network devices to detect and drop overlapping or malformed IP fragments that resemble teardrop or Bonk attack patterns. 3. Segment legacy systems from general network traffic using VLANs or air-gapping to reduce exposure. 4. Employ network anomaly detection tools to monitor for unusual fragmentation patterns indicative of an attack. 5. Where upgrading is not immediately feasible, consider disabling IP fragmentation reassembly if possible or applying host-based firewall rules to limit exposure. 6. Maintain strict network access controls and monitor logs for signs of repeated malformed packet attempts. These steps go beyond generic advice by focusing on network-level defenses and legacy system isolation, which are critical given the absence of patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de8fc

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:40:51 PM

Last updated: 8/13/2025, 7:21:12 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats