Skip to main content

CVE-1999-0265: ICMP redirect messages may crash or lock up a host.

Medium
VulnerabilityCVE-1999-0265cve-1999-0265cwe-20
Published: Wed Jan 01 1997 (01/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: microware
Product: os-9

Description

ICMP redirect messages may crash or lock up a host.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:26:17 UTC

Technical Analysis

CVE-1999-0265 is a vulnerability affecting the OS-9 operating system version 3.12 developed by Microware. The issue arises from the improper handling of ICMP redirect messages, which are network-layer control messages used to inform hosts of a better route for sending packets. In this vulnerability, specially crafted ICMP redirect packets can cause the affected host to crash or become unresponsive (lock up). The root cause is likely due to insufficient input validation or improper processing of these ICMP messages, categorized under CWE-20 (Improper Input Validation). The vulnerability does not impact confidentiality or integrity directly but affects availability by causing denial of service (DoS). The CVSS v2 score is 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P indicating network attack vector, low attack complexity, no authentication required, no confidentiality or integrity impact, and partial availability impact. No patches are available, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1997) and the niche nature of the OS-9 operating system, this vulnerability is primarily relevant in legacy or embedded systems still running this OS version. Attackers could send malicious ICMP redirect packets over the network to disrupt system availability, potentially impacting critical embedded devices or industrial control systems using OS-9 3.12.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence of OS-9 3.12 in their infrastructure. OS-9 is a real-time operating system often used in embedded systems, industrial control, telecommunications, and specialized hardware. If European entities operate legacy or industrial systems running this OS version, they could face denial of service conditions caused by malicious ICMP redirect messages. This could disrupt critical operations, especially in sectors like manufacturing, utilities, transportation, or telecommunications where embedded systems are prevalent. However, given the age and niche deployment of OS-9 3.12, the overall impact on mainstream IT infrastructure in Europe is likely minimal. The vulnerability does not allow data theft or system compromise beyond availability loss, but availability disruptions in critical embedded systems could have safety or operational consequences.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should focus on network-level mitigations and system hardening. Specifically: 1) Implement network filtering to block or drop ICMP redirect messages at network boundaries or on devices running OS-9 3.12. This can be done via firewalls or router ACLs to prevent malicious ICMP redirect packets from reaching vulnerable hosts. 2) Disable acceptance of ICMP redirect messages on affected devices if the OS or device configuration allows it. 3) Segment and isolate legacy embedded systems running OS-9 3.12 from untrusted networks to reduce exposure. 4) Monitor network traffic for unusual ICMP redirect activity that could indicate exploitation attempts. 5) Where possible, plan for system upgrades or migration away from unsupported OS-9 versions to modern, supported platforms with security updates. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures for anomalous ICMP redirect traffic. These steps will help mitigate the risk of denial of service attacks exploiting this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de5cc

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:26:17 AM

Last updated: 8/18/2025, 10:20:17 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats