Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0367: NetBSD netstat command allows local users to access kernel memory.

0
Low
VulnerabilityCVE-1999-0367cve-1999-0367
Published: Tue Feb 09 1999 (02/09/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: netbsd
Product: netbsd

Description

NetBSD netstat command allows local users to access kernel memory.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:54:56 UTC

Technical Analysis

CVE-1999-0367 is a vulnerability identified in the NetBSD operating system version 2.0.4, specifically involving the netstat command. The netstat utility, commonly used for network statistics and monitoring, in this version allows local users to access kernel memory. This vulnerability arises because the netstat command improperly exposes kernel memory contents to unprivileged local users, potentially leaking sensitive information stored in the kernel space. The vulnerability does not allow modification of kernel memory or disruption of system availability but compromises confidentiality by permitting unauthorized read access. The CVSS score of 2.1 (low severity) reflects that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality partially (C:P) without affecting integrity (I:N) or availability (A:N). Since this vulnerability dates back to 1999 and affects an older NetBSD version, it is unlikely to be present in modern deployments. No patches are available, and no known exploits have been reported in the wild, indicating limited practical exploitation. However, in environments where legacy NetBSD 2.0.4 systems are still in use, this vulnerability could be a concern for insider threats or unauthorized local users seeking to gather kernel memory information for further attacks or reconnaissance.

Potential Impact

For European organizations, the impact of CVE-1999-0367 is generally low due to the age of the affected software version and the limited scope of the vulnerability. The primary risk is unauthorized disclosure of kernel memory contents to local users, which could reveal sensitive system information such as kernel data structures, network information, or cryptographic keys stored in memory. This could facilitate further targeted attacks or privilege escalation attempts. However, since exploitation requires local access and does not allow modification or denial of service, the overall operational impact is minimal. Organizations running legacy NetBSD 2.0.4 systems in critical infrastructure or research environments might face a higher risk if local user accounts are not tightly controlled. In modern contexts, this vulnerability is unlikely to affect typical enterprise or governmental systems in Europe, but legacy systems in niche or embedded applications could still be vulnerable.

Mitigation Recommendations

Given that no official patch is available for this vulnerability, European organizations should focus on compensating controls. First, restrict local user access strictly on any systems running NetBSD 2.0.4, ensuring only trusted administrators have shell access. Employ strong authentication and authorization mechanisms to limit local user accounts. Consider isolating legacy systems from general user environments and sensitive networks to reduce the risk of unauthorized local access. If possible, upgrade or migrate from NetBSD 2.0.4 to a more recent, supported version of NetBSD or another secure operating system that does not exhibit this vulnerability. Additionally, monitor system logs for unusual local user activity and implement host-based intrusion detection systems to detect attempts to access kernel memory or run netstat in suspicious ways. For environments where upgrading is not feasible, consider disabling or restricting the netstat utility or replacing it with safer alternatives that do not expose kernel memory.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dee08

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:54:56 PM

Last updated: 2/7/2026, 5:41:40 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats