Skip to main content

CVE-1999-0400: Denial of service in Linux 2.2.0 running the ldd command on a core file.

Medium
VulnerabilityCVE-1999-0400cve-1999-0400denial of service
Published: Tue Jan 26 1999 (01/26/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

Denial of service in Linux 2.2.0 running the ldd command on a core file.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:57:20 UTC

Technical Analysis

CVE-1999-0400 is a vulnerability identified in the Linux kernel version 2.2.0, specifically involving a denial of service (DoS) condition triggered when the 'ldd' command is run on a core file. The 'ldd' utility is used to print the shared libraries required by a program, and when executed on a core dump file, it can cause the system to become unresponsive or crash. This vulnerability arises due to improper handling of core files by the 'ldd' command in this kernel version, leading to resource exhaustion or kernel instability. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N), and impacts confidentiality, integrity, and availability to some extent (C:P/I:P/A:P). However, exploitation requires local access to the system and the ability to execute the 'ldd' command on a core file, which limits the attack surface. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1999) and the affected kernel version being 2.2.0, which is obsolete and no longer in widespread use, the practical risk today is minimal. Nonetheless, it represents a classic example of how improper handling of diagnostic files can lead to denial of service conditions in operating systems.

Potential Impact

For European organizations, the direct impact of CVE-1999-0400 is minimal due to the obsolescence of Linux kernel 2.2.0 in modern production environments. Most organizations have long since upgraded to newer, supported kernel versions that do not exhibit this vulnerability. However, in legacy systems or specialized industrial environments where outdated Linux kernels might still be in use, this vulnerability could cause local denial of service, potentially disrupting critical services or operations. The requirement for local access and execution privileges reduces the likelihood of remote exploitation, but insider threats or attackers with initial foothold could leverage this to escalate disruption. Confidentiality and integrity impacts are limited but present, as the vulnerability affects system stability and could be used to interrupt service availability. Overall, the threat is largely historical but should be considered in legacy system risk assessments.

Mitigation Recommendations

Given the absence of an official patch, the primary mitigation is to upgrade the Linux kernel to a supported and maintained version that does not exhibit this vulnerability. Organizations should audit their environments to identify any systems running Linux kernel 2.2.0 or similarly outdated versions and plan for immediate upgrade or decommissioning. If upgrading is not immediately feasible, restricting local user access and limiting the ability to execute the 'ldd' command on core files can reduce risk. Implement strict access controls and monitoring on systems with legacy kernels to detect and prevent unauthorized local execution of diagnostic commands. Additionally, consider disabling core dumps or redirecting them to secure locations to prevent exploitation via crafted core files. Regular security assessments and system hardening practices should be maintained to minimize exposure to such legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dedb1

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:57:20 PM

Last updated: 8/16/2025, 6:40:46 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats