Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0814: Red Hat pump DHCP client allows remote attackers to gain root access in some configurations.

0
High
VulnerabilityCVE-1999-0814cve-1999-0814
Published: Wed Aug 11 1999 (08/11/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

Red Hat pump DHCP client allows remote attackers to gain root access in some configurations.

AI-Powered Analysis

AILast updated: 06/27/2025, 18:24:49 UTC

Technical Analysis

CVE-1999-0814 is a critical vulnerability found in the Red Hat pump DHCP client, specifically affecting Red Hat Linux version 6.0. The vulnerability allows remote attackers to gain root-level access on affected systems without any authentication or user interaction. The pump DHCP client is responsible for obtaining network configuration parameters from a DHCP server. Due to improper handling of DHCP responses, an attacker controlling a malicious DHCP server or positioned on the same network segment can craft malicious DHCP packets that exploit this flaw. Successful exploitation results in complete compromise of the affected system, granting the attacker full control including confidentiality, integrity, and availability impacts. The vulnerability has a CVSS v2 base score of 10.0, indicating maximum severity, with attack vector being network-based, no required authentication, and low attack complexity. Although this vulnerability dates back to 1999 and affects an outdated Linux distribution, it remains a significant example of remote code execution via network service exploitation. No patches or fixes are available for this specific vulnerability, and there are no known exploits currently in the wild. However, the risk remains for legacy systems still running Red Hat Linux 6.0 with the pump DHCP client in use.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those maintaining legacy Red Hat Linux 6.0 systems, which may still be in use in some industrial, governmental, or research environments. Exploitation would allow attackers to gain root access remotely, leading to full system compromise. This could result in data breaches, disruption of critical services, unauthorized access to sensitive information, and potential lateral movement within networks. Given the age of the vulnerability, modern systems are unlikely to be affected, but legacy infrastructure in sectors such as manufacturing, energy, or public administration could be at risk if not properly isolated or updated. The confidentiality, integrity, and availability of affected systems would be severely impacted, potentially causing operational disruptions and regulatory compliance issues under GDPR if personal data is involved.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems running Red Hat Linux 6.0 or using the pump DHCP client. 2) Decommission or upgrade legacy systems to supported, patched Linux distributions to eliminate exposure. 3) If immediate upgrade is not feasible, isolate affected systems within segmented network zones with strict access controls to prevent exposure to untrusted DHCP servers. 4) Disable or replace the pump DHCP client with a more secure DHCP client implementation. 5) Employ network monitoring to detect anomalous DHCP traffic and potential exploitation attempts. 6) Implement strict DHCP server authentication and validation mechanisms where possible to prevent rogue DHCP servers. 7) Regularly review and update network device configurations to minimize attack surface. These steps go beyond generic advice by focusing on legacy system management, network segmentation, and DHCP-specific controls.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df170

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 6:24:49 PM

Last updated: 2/4/2026, 10:33:34 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats