Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0745: Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C

0
High
VulnerabilityCVE-1999-0745cve-1999-0745rcebuffer overflow
Published: Wed Aug 18 1999 (08/18/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: ibm
Product: aix

Description

Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.

AI-Powered Analysis

AILast updated: 06/27/2025, 18:10:03 UTC

Technical Analysis

CVE-1999-0745 is a critical buffer overflow vulnerability found in the Source Code Browser Program Database Name Server Daemon (pdnsd) component of the IBM AIX C Set ++ compiler environment. This vulnerability affects multiple versions of IBM AIX, specifically versions 2.2.1, 3.1, 3.2, 3.2.4, and 3.2.5. The buffer overflow occurs when pdnsd improperly handles input data, allowing an attacker to overwrite memory beyond the intended buffer boundaries. This can lead to arbitrary code execution, enabling remote attackers to execute malicious code with the privileges of the pdnsd process. The vulnerability is remotely exploitable without authentication (AV:N/AC:L/Au:N), and it impacts confidentiality, integrity, and availability (C:C/I:C/A:C), as indicated by the CVSS score of 10.0, the highest possible severity rating. Despite its age, this vulnerability remains significant for legacy systems still running affected AIX versions, particularly in environments where pdnsd is exposed to untrusted networks. No patches are available, and no known exploits have been reported in the wild, but the theoretical risk remains high due to the nature of the vulnerability and the criticality of the affected systems.

Potential Impact

For European organizations, the impact of this vulnerability can be severe if legacy IBM AIX systems running the affected versions are still in use, especially in critical infrastructure sectors such as finance, manufacturing, telecommunications, or government. Exploitation could lead to full system compromise, data breaches, and disruption of services. Given the high severity and remote exploitability without authentication, attackers could leverage this vulnerability to gain unauthorized access, manipulate sensitive data, or cause denial of service. The lack of available patches increases the risk, as organizations must rely on compensating controls or system upgrades. The impact is amplified in environments where these AIX systems are integrated into broader enterprise networks, potentially serving as pivot points for lateral movement by attackers.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory all IBM AIX systems running the affected versions and assess their exposure to untrusted networks. 2) Isolate or segment vulnerable systems from external and less trusted internal networks using network segmentation and strict firewall rules to limit access to pdnsd services. 3) Disable or restrict the use of the Source Code Browser Program Database Name Server Daemon (pdnsd) if it is not essential for operations. 4) Implement strict monitoring and logging around these systems to detect any anomalous activity or exploitation attempts. 5) Where possible, upgrade or migrate legacy AIX systems to supported versions or alternative platforms that do not contain this vulnerability. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts targeting pdnsd. 7) Conduct regular security assessments and penetration testing focused on legacy systems to identify and remediate other potential vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df191

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 6:10:03 PM

Last updated: 2/7/2026, 2:24:14 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats