Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0265: ICMP redirect messages may crash or lock up a host.

0
Medium
VulnerabilityCVE-1999-0265cve-1999-0265cwe-20
Published: Wed Jan 01 1997 (01/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: microware
Product: os-9

Description

ICMP redirect messages may crash or lock up a host.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:26:17 UTC

Technical Analysis

CVE-1999-0265 is a vulnerability affecting the OS-9 operating system version 3.12 developed by Microware. The issue arises from the improper handling of ICMP redirect messages, which are network-layer control messages used to inform hosts of a better route for sending packets. In this vulnerability, specially crafted ICMP redirect packets can cause the affected host to crash or become unresponsive (lock up). The root cause is likely due to insufficient input validation or improper processing of these ICMP messages, categorized under CWE-20 (Improper Input Validation). The vulnerability does not impact confidentiality or integrity directly but affects availability by causing denial of service (DoS). The CVSS v2 score is 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P indicating network attack vector, low attack complexity, no authentication required, no confidentiality or integrity impact, and partial availability impact. No patches are available, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1997) and the niche nature of the OS-9 operating system, this vulnerability is primarily relevant in legacy or embedded systems still running this OS version. Attackers could send malicious ICMP redirect packets over the network to disrupt system availability, potentially impacting critical embedded devices or industrial control systems using OS-9 3.12.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence of OS-9 3.12 in their infrastructure. OS-9 is a real-time operating system often used in embedded systems, industrial control, telecommunications, and specialized hardware. If European entities operate legacy or industrial systems running this OS version, they could face denial of service conditions caused by malicious ICMP redirect messages. This could disrupt critical operations, especially in sectors like manufacturing, utilities, transportation, or telecommunications where embedded systems are prevalent. However, given the age and niche deployment of OS-9 3.12, the overall impact on mainstream IT infrastructure in Europe is likely minimal. The vulnerability does not allow data theft or system compromise beyond availability loss, but availability disruptions in critical embedded systems could have safety or operational consequences.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should focus on network-level mitigations and system hardening. Specifically: 1) Implement network filtering to block or drop ICMP redirect messages at network boundaries or on devices running OS-9 3.12. This can be done via firewalls or router ACLs to prevent malicious ICMP redirect packets from reaching vulnerable hosts. 2) Disable acceptance of ICMP redirect messages on affected devices if the OS or device configuration allows it. 3) Segment and isolate legacy embedded systems running OS-9 3.12 from untrusted networks to reduce exposure. 4) Monitor network traffic for unusual ICMP redirect activity that could indicate exploitation attempts. 5) Where possible, plan for system upgrades or migration away from unsupported OS-9 versions to modern, supported platforms with security updates. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures for anomalous ICMP redirect traffic. These steps will help mitigate the risk of denial of service attacks exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de5cc

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:26:17 AM

Last updated: 2/4/2026, 12:41:25 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats