CVE-1999-0305: The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and ea
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
AI Analysis
Technical Summary
CVE-1999-0305 is a vulnerability affecting the system configuration control (sysctl) facility in BSD-based operating systems, specifically OpenBSD versions 2.2 and earlier, and FreeBSD version 2.2.5 and earlier. The sysctl interface is responsible for managing kernel parameters at runtime, including network configuration settings. This vulnerability arises because the sysctl facility does not properly restrict source-routed packets, even when the dosourceroute or forwarding variables are enabled. Source routing allows the sender of a packet to specify the route that the packet should take through the network. Improper handling of such packets can allow an attacker to spoof TCP connections remotely by manipulating the routing path, effectively bypassing normal network security controls. The vulnerability does not require authentication and can be exploited remotely over the network, making it a network vector attack with low complexity. The impact is primarily on confidentiality, as attackers can spoof TCP connections, potentially intercepting or injecting data into network sessions. However, the vulnerability does not directly affect integrity or availability. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The CVSS score is 5.0 (medium severity), reflecting the moderate impact and ease of exploitation without authentication. This vulnerability is historical and affects legacy BSD operating systems that are largely obsolete today.
Potential Impact
For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of the affected BSD versions (OpenBSD 2.2 and earlier, FreeBSD 2.2.5 and earlier). However, any legacy systems still running these versions could be at risk of TCP connection spoofing attacks, which could lead to unauthorized access to network services or interception of sensitive communications. This could compromise confidentiality and potentially allow attackers to bypass network access controls. Organizations relying on legacy BSD systems in critical infrastructure, research, or specialized environments should be particularly cautious. The vulnerability could also be leveraged in targeted attacks against legacy systems in government, academic, or industrial sectors where BSD variants were historically used. Although no known exploits are reported, the lack of a patch means that any discovered exploitation technique could pose a risk. Overall, the impact on modern European organizations is low unless legacy BSD systems remain in use without mitigation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should consider the following specific mitigation strategies: 1) Identify and inventory all BSD-based systems in the environment, especially legacy versions of OpenBSD and FreeBSD. 2) Upgrade affected BSD systems to supported, patched versions that do not exhibit this vulnerability. If upgrading is not immediately possible, isolate legacy BSD systems from untrusted networks to prevent remote exploitation. 3) Disable source routing on network devices and hosts wherever possible, as source routing is rarely needed and is a common attack vector. 4) Implement network-level filtering to block source-routed packets at perimeter firewalls and routers. 5) Monitor network traffic for anomalous source-routed packets or suspicious TCP connection attempts that could indicate exploitation attempts. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect source routing abuses. 7) For critical legacy systems that cannot be upgraded or isolated, consider deploying virtual patching or compensating controls such as strict access control lists and network segmentation. These measures go beyond generic advice by focusing on legacy system identification, network-level controls, and compensating controls tailored to the nature of the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden
CVE-1999-0305: The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and ea
Description
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
AI-Powered Analysis
Technical Analysis
CVE-1999-0305 is a vulnerability affecting the system configuration control (sysctl) facility in BSD-based operating systems, specifically OpenBSD versions 2.2 and earlier, and FreeBSD version 2.2.5 and earlier. The sysctl interface is responsible for managing kernel parameters at runtime, including network configuration settings. This vulnerability arises because the sysctl facility does not properly restrict source-routed packets, even when the dosourceroute or forwarding variables are enabled. Source routing allows the sender of a packet to specify the route that the packet should take through the network. Improper handling of such packets can allow an attacker to spoof TCP connections remotely by manipulating the routing path, effectively bypassing normal network security controls. The vulnerability does not require authentication and can be exploited remotely over the network, making it a network vector attack with low complexity. The impact is primarily on confidentiality, as attackers can spoof TCP connections, potentially intercepting or injecting data into network sessions. However, the vulnerability does not directly affect integrity or availability. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The CVSS score is 5.0 (medium severity), reflecting the moderate impact and ease of exploitation without authentication. This vulnerability is historical and affects legacy BSD operating systems that are largely obsolete today.
Potential Impact
For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of the affected BSD versions (OpenBSD 2.2 and earlier, FreeBSD 2.2.5 and earlier). However, any legacy systems still running these versions could be at risk of TCP connection spoofing attacks, which could lead to unauthorized access to network services or interception of sensitive communications. This could compromise confidentiality and potentially allow attackers to bypass network access controls. Organizations relying on legacy BSD systems in critical infrastructure, research, or specialized environments should be particularly cautious. The vulnerability could also be leveraged in targeted attacks against legacy systems in government, academic, or industrial sectors where BSD variants were historically used. Although no known exploits are reported, the lack of a patch means that any discovered exploitation technique could pose a risk. Overall, the impact on modern European organizations is low unless legacy BSD systems remain in use without mitigation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should consider the following specific mitigation strategies: 1) Identify and inventory all BSD-based systems in the environment, especially legacy versions of OpenBSD and FreeBSD. 2) Upgrade affected BSD systems to supported, patched versions that do not exhibit this vulnerability. If upgrading is not immediately possible, isolate legacy BSD systems from untrusted networks to prevent remote exploitation. 3) Disable source routing on network devices and hosts wherever possible, as source routing is rarely needed and is a common attack vector. 4) Implement network-level filtering to block source-routed packets at perimeter firewalls and routers. 5) Monitor network traffic for anomalous source-routed packets or suspicious TCP connection attempts that could indicate exploitation attempts. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect source routing abuses. 7) For critical legacy systems that cannot be upgraded or isolated, consider deploying virtual patching or compensating controls such as strict access control lists and network segmentation. These measures go beyond generic advice by focusing on legacy system identification, network-level controls, and compensating controls tailored to the nature of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7de8f2
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 10:41:35 PM
Last updated: 7/29/2025, 10:05:45 AM
Views: 9
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.