Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0478: Denial of service in HP-UX sendmail 8.8.6 related to accepting connections.

0
Medium
VulnerabilityCVE-1999-0478cve-1999-0478denial of service
Published: Tue Dec 01 1998 (12/01/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: sendmail
Product: sendmail

Description

Denial of service in HP-UX sendmail 8.8.6 related to accepting connections.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:25:22 UTC

Technical Analysis

CVE-1999-0478 is a medium-severity denial of service (DoS) vulnerability affecting the sendmail 8.8.6 mail transfer agent running on HP-UX operating systems. The vulnerability arises from the way sendmail handles incoming connection requests. Specifically, the flaw allows an attacker to cause the sendmail daemon to become unresponsive or crash by sending specially crafted connection attempts. This disrupts the mail service by exhausting resources or causing the process to fail, thereby denying legitimate users the ability to send or receive email through the affected server. The vulnerability does not impact confidentiality or integrity of data, nor does it require authentication or user interaction to exploit. The CVSS base score is 5.0, reflecting a network attack vector with low attack complexity and no required privileges, but limited impact confined to availability. No patches are available for this issue, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1998) and the specific affected version (sendmail 8.8.6 on HP-UX), this issue is primarily relevant to legacy systems still running this configuration.

Potential Impact

For European organizations, the impact of this vulnerability is primarily operational disruption due to denial of service on mail servers running the vulnerable sendmail version on HP-UX. Organizations relying on legacy HP-UX infrastructure with sendmail 8.8.6 could experience mail outages, affecting internal and external communications. This could lead to delays in business processes, customer service degradation, and potential loss of trust if email availability is critical. However, since the vulnerability does not compromise data confidentiality or integrity, the risk of data breach is minimal. The lack of known exploits and the age of the vulnerability suggest that most modern European organizations have likely migrated away from this software version or platform, reducing widespread impact. Nevertheless, sectors with legacy systems, such as certain government agencies, industrial control environments, or financial institutions with long-lived infrastructure, may still be vulnerable and should assess exposure carefully.

Mitigation Recommendations

Given that no official patches are available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Identify and inventory all HP-UX systems running sendmail 8.8.6 to assess exposure. 2) Where possible, upgrade sendmail to a more recent, supported version or migrate mail services to modern platforms that receive security updates. 3) If upgrading is not immediately feasible, implement network-level protections such as firewall rules or intrusion prevention systems to restrict or rate-limit incoming SMTP connections to trusted sources, reducing the risk of DoS attempts. 4) Monitor mail server logs and network traffic for unusual connection patterns that may indicate exploitation attempts. 5) Consider deploying redundant mail servers or failover mechanisms to maintain mail availability in case of service disruption. 6) Engage with HP-UX support channels or third-party vendors for potential backported fixes or workarounds. These targeted actions go beyond generic advice by focusing on legacy system identification, network controls, and operational continuity.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deb62

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:25:22 PM

Last updated: 2/7/2026, 10:02:27 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats