Skip to main content

CVE-1999-0804: Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes,

Medium
VulnerabilityCVE-1999-0804cve-1999-0804denial of service
Published: Tue Jun 01 1999 (06/01/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: debian
Product: debian_linux

Description

Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:25:21 UTC

Technical Analysis

CVE-1999-0804 is a vulnerability affecting Linux kernel versions 2.1, 2.2.0, and Debian Linux versions 6.0 and 6.1, identified in 1999. The issue arises from the kernel's improper handling of malformed ICMP (Internet Control Message Protocol) packets that contain unusual or unexpected types, codes, and IP header lengths. Specifically, these malformed packets can cause the affected Linux kernel to crash or become unresponsive, resulting in a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but directly affects availability by disrupting normal network operations. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L), making it relatively easy to exploit if an attacker can send crafted ICMP packets to the target system. However, this vulnerability is specific to very old Linux kernel versions (2.2.x series) and Debian releases from the late 1990s, which are no longer maintained or widely used in modern environments. No patches are available for this vulnerability, and there are no known exploits in the wild currently. The CVSS score is 5.0, indicating a medium severity level primarily due to the denial of service impact and ease of exploitation without authentication or user interaction.

Potential Impact

For European organizations, the direct impact of CVE-1999-0804 today is minimal due to the obsolescence of the affected Linux kernel versions and Debian releases. Modern Linux distributions have long since replaced these kernels with secure, patched versions. However, if legacy systems or embedded devices running these outdated kernels remain in operation, they could be susceptible to network-based DoS attacks that disrupt availability. Such disruptions could affect critical services, especially in sectors relying on legacy infrastructure, including industrial control systems or specialized network appliances. The vulnerability could be exploited to cause temporary outages, impacting business continuity and potentially leading to operational delays. Given the lack of known exploits and the age of the vulnerability, the likelihood of targeted attacks exploiting this issue in European organizations is low but not impossible in niche legacy environments.

Mitigation Recommendations

The most effective mitigation is to upgrade all affected systems to modern, supported Linux kernel versions and Debian releases. Organizations should conduct thorough asset inventories to identify any legacy systems still running Linux 2.2.x kernels or Debian 6.0/6.1 and plan for their replacement or upgrade. Network-level mitigations include configuring firewalls and intrusion prevention systems to block or rate-limit ICMP traffic, especially malformed or unusual ICMP packets, to reduce exposure to potential DoS attempts. Employing network segmentation to isolate legacy systems from critical infrastructure can also limit the impact of any exploitation. Since no patches are available, reliance on system upgrades and network controls is essential. Regular monitoring of network traffic for anomalous ICMP packets can help detect attempted exploitation attempts early.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df051

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 5:25:21 PM

Last updated: 7/30/2025, 4:00:05 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats