Skip to main content

CVE-1999-0485: Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.

Low
VulnerabilityCVE-1999-0485cve-1999-0485
Published: Fri Feb 19 1999 (02/19/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: openbsd
Product: openbsd

Description

Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:41:40 UTC

Technical Analysis

CVE-1999-0485 is a vulnerability identified in OpenBSD version 2.4, specifically within the ipintr() function in the ipq component. This vulnerability allows remote attackers to cause a system crash, effectively resulting in a denial-of-service (DoS) condition. The issue lies in the handling of IP packets within the ipq (IP queue) subsystem, where crafted network traffic can trigger a fault in the ipintr() function, leading to system instability or crash. Since this vulnerability dates back to 1999 and affects an outdated OpenBSD version, it reflects a historical security flaw rather than a contemporary threat. The CVSS score of 2.6 (low severity) indicates that while the vulnerability can impact system availability, it requires high attack complexity and does not affect confidentiality or integrity. There is no authentication required to exploit this vulnerability, but the attacker must be able to send specially crafted packets to the target system over the network. No patches are available for this specific version, and there are no known exploits in the wild documented. Given the age of the vulnerability and the obsolescence of OpenBSD 2.4, modern systems are unlikely to be affected unless legacy systems remain in operation.

Potential Impact

For European organizations, the impact of CVE-1999-0485 is generally minimal due to the obsolescence of OpenBSD 2.4 in production environments. However, if legacy systems running this version are still in use—such as in specialized or embedded environments—there is a risk of denial-of-service attacks that can disrupt network services or critical infrastructure components relying on these systems. The vulnerability does not compromise data confidentiality or integrity but can cause service outages, which may affect business continuity, especially in sectors requiring high availability like telecommunications, finance, or government services. The low severity and lack of known exploits reduce the immediate threat level, but organizations should verify that no unsupported OpenBSD 2.4 systems remain active in their network to avoid potential disruptions.

Mitigation Recommendations

Given that no patches are available for OpenBSD 2.4, the most effective mitigation is to upgrade affected systems to a supported and updated version of OpenBSD where this vulnerability has been addressed. Organizations should conduct thorough asset inventories to identify any legacy systems running OpenBSD 2.4 and plan for their decommissioning or upgrade. Network-level mitigations include implementing strict ingress filtering and firewall rules to block unsolicited or malformed IP packets that could trigger the vulnerability. Additionally, deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect anomalous IP traffic patterns may help mitigate exploitation attempts. For environments where upgrading is not immediately feasible, isolating vulnerable systems from untrusted networks and restricting access to trusted management networks can reduce exposure. Regular network monitoring and incident response readiness are also recommended to quickly detect and respond to any denial-of-service activity.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dee4e

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:41:40 PM

Last updated: 7/30/2025, 5:11:58 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats