Skip to main content

CVE-1999-0451: Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non

Low
VulnerabilityCVE-1999-0451cve-1999-0451denial of service
Published: Tue Jan 19 1999 (01/19/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.

AI-Powered Analysis

AILast updated: 07/01/2025, 20:09:53 UTC

Technical Analysis

CVE-1999-0451 is a denial of service (DoS) vulnerability affecting Linux kernel versions 2.0 and 2.2.0, specifically identified in version 2.0.36. The vulnerability allows local users to prevent any server process from binding to and listening on any non-privileged TCP or UDP port. Non-privileged ports are those with port numbers above 1023, which are commonly used by user-level applications and services. The issue arises because a local user can exploit kernel-level flaws to block these ports, effectively denying service to legitimate server applications that require network communication on these ports. The vulnerability requires local access, meaning an attacker must have an account or shell access on the affected system to exploit it. No authentication is required beyond local user privileges, and no network interaction is necessary for exploitation. The CVSS v2 score is 2.1, reflecting a low severity primarily due to the local access requirement and limited impact scope. The vulnerability does not affect confidentiality or integrity but impacts availability by preventing servers from accepting connections on non-privileged ports. No patches or fixes are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability and the affected kernel versions, modern Linux systems are not impacted. However, legacy systems or embedded devices running these outdated kernels could be vulnerable if local access is obtained.

Potential Impact

For European organizations, the direct impact of CVE-1999-0451 is minimal in modern contexts, as the affected Linux kernel versions (2.0 and 2.2.0) are obsolete and no longer in widespread use. However, organizations that maintain legacy infrastructure, industrial control systems, or embedded devices running these older kernels could face availability issues if local attackers exploit this vulnerability. The denial of service could disrupt critical services relying on non-privileged ports, potentially affecting internal applications, development environments, or legacy network services. While the vulnerability does not allow remote exploitation, insider threats or attackers who gain local access through other means could leverage this flaw to cause service outages. This could lead to operational disruptions, impacting business continuity and service delivery. The risk is higher in environments where legacy Linux systems are still operational without proper segmentation or access controls.

Mitigation Recommendations

To mitigate the risk posed by CVE-1999-0451, European organizations should: 1) Identify and inventory any systems running Linux kernel versions 2.0 or 2.2.0, particularly version 2.0.36. 2) Upgrade or replace legacy systems with modern, supported Linux distributions that include kernel versions with security patches and improvements. 3) Implement strict access controls and user privilege management to limit local user access to trusted personnel only, reducing the risk of local exploitation. 4) Employ network segmentation and isolation for legacy systems to minimize exposure and potential impact of local attacks. 5) Monitor local user activities and audit system logs for unusual attempts to bind to non-privileged ports or other suspicious behaviors. 6) Where upgrading is not feasible, consider deploying compensating controls such as mandatory access control (MAC) frameworks (e.g., SELinux, AppArmor) to restrict user capabilities. 7) Educate system administrators and users about the risks of running outdated kernels and the importance of timely patching and system updates.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7ded94

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 8:09:53 PM

Last updated: 8/14/2025, 8:09:14 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats