CVE-1999-0772: Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent t
Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
AI Analysis
Technical Summary
CVE-1999-0772 is a denial of service (DoS) vulnerability affecting Compaq Management Agents and the Compaq Survey Utility, specifically version 2.0 of the Insight Management Agent product. The vulnerability arises when a specially crafted, excessively long string is sent to port 2301, which these services listen on. This input causes the affected software to crash or become unresponsive, resulting in a denial of service condition. The vulnerability requires no authentication and can be exploited remotely over the network, as indicated by the CVSS vector AV:N/AC:L/Au:N/C:P/I:N/A:P. The impact on confidentiality and integrity is limited (partial confidentiality impact, no integrity impact), but availability is significantly affected. Since the vulnerability dates back to 1999 and no patches are available, it is likely that this software is either deprecated or replaced in modern environments. However, legacy systems still running this version of Compaq Insight Management Agent remain vulnerable. The lack of known exploits in the wild suggests limited active exploitation, but the ease of triggering the DoS condition via a simple network request means opportunistic attackers could cause service disruption. The vulnerability is medium severity with a CVSS score of 6.4, reflecting the moderate impact and ease of exploitation without authentication or user interaction.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption of systems monitored or managed by the Compaq Insight Management Agent version 2.0. This could affect IT infrastructure management, monitoring, and automated system surveys, potentially leading to downtime or degraded operational visibility. Organizations relying on legacy Compaq hardware and management tools may experience interruptions in system management workflows, impacting incident response and maintenance activities. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and operational efficiency. Critical infrastructure or data centers using legacy Compaq management agents could be targeted to cause temporary outages. Given the age of the vulnerability, most modern European enterprises are unlikely to be affected unless they maintain legacy systems without upgrades or replacements.
Mitigation Recommendations
Since no patches are available for this vulnerability, European organizations should focus on compensating controls. First, identify and inventory any legacy Compaq Insight Management Agent installations, especially version 2.0, within their networks. If found, isolate these systems from untrusted networks or restrict access to port 2301 using network segmentation and firewall rules to prevent unauthorized external access. Employ intrusion detection or prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting port 2301. Consider upgrading or replacing legacy Compaq management tools with modern, supported alternatives to eliminate exposure. Additionally, implement network-level rate limiting and anomaly detection to identify and mitigate potential DoS attempts. Regularly review and update asset management to avoid unknown legacy systems remaining in production environments. Finally, maintain robust incident response plans to quickly address any service disruptions caused by exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy
CVE-1999-0772: Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent t
Description
Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
AI-Powered Analysis
Technical Analysis
CVE-1999-0772 is a denial of service (DoS) vulnerability affecting Compaq Management Agents and the Compaq Survey Utility, specifically version 2.0 of the Insight Management Agent product. The vulnerability arises when a specially crafted, excessively long string is sent to port 2301, which these services listen on. This input causes the affected software to crash or become unresponsive, resulting in a denial of service condition. The vulnerability requires no authentication and can be exploited remotely over the network, as indicated by the CVSS vector AV:N/AC:L/Au:N/C:P/I:N/A:P. The impact on confidentiality and integrity is limited (partial confidentiality impact, no integrity impact), but availability is significantly affected. Since the vulnerability dates back to 1999 and no patches are available, it is likely that this software is either deprecated or replaced in modern environments. However, legacy systems still running this version of Compaq Insight Management Agent remain vulnerable. The lack of known exploits in the wild suggests limited active exploitation, but the ease of triggering the DoS condition via a simple network request means opportunistic attackers could cause service disruption. The vulnerability is medium severity with a CVSS score of 6.4, reflecting the moderate impact and ease of exploitation without authentication or user interaction.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption of systems monitored or managed by the Compaq Insight Management Agent version 2.0. This could affect IT infrastructure management, monitoring, and automated system surveys, potentially leading to downtime or degraded operational visibility. Organizations relying on legacy Compaq hardware and management tools may experience interruptions in system management workflows, impacting incident response and maintenance activities. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and operational efficiency. Critical infrastructure or data centers using legacy Compaq management agents could be targeted to cause temporary outages. Given the age of the vulnerability, most modern European enterprises are unlikely to be affected unless they maintain legacy systems without upgrades or replacements.
Mitigation Recommendations
Since no patches are available for this vulnerability, European organizations should focus on compensating controls. First, identify and inventory any legacy Compaq Insight Management Agent installations, especially version 2.0, within their networks. If found, isolate these systems from untrusted networks or restrict access to port 2301 using network segmentation and firewall rules to prevent unauthorized external access. Employ intrusion detection or prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting port 2301. Consider upgrading or replacing legacy Compaq management tools with modern, supported alternatives to eliminate exposure. Additionally, implement network-level rate limiting and anomaly detection to identify and mitigate potential DoS attempts. Regularly review and update asset management to avoid unknown legacy systems remaining in production environments. Finally, maintain robust incident response plans to quickly address any service disruptions caused by exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32cb6fd31d6ed7df044
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 5:25:33 PM
Last updated: 8/11/2025, 9:45:30 AM
Views: 11
Related Threats
CVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-55590: n/a
MediumCVE-2025-55589: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.