Skip to main content

CVE-1999-0851: Denial of service in BIND named via naptr.

Low
VulnerabilityCVE-1999-0851cve-1999-0851denial of service
Published: Wed Nov 10 1999 (11/10/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ibm
Product: aix

Description

Denial of service in BIND named via naptr.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:57:07 UTC

Technical Analysis

CVE-1999-0851 is a vulnerability identified in the BIND (Berkeley Internet Name Domain) named service, specifically related to the handling of NAPTR (Naming Authority Pointer) DNS resource records. BIND is a widely used DNS server software, and the named daemon is responsible for resolving DNS queries. The vulnerability allows an attacker to cause a denial of service (DoS) condition by sending specially crafted NAPTR queries to the affected BIND named service. This results in the service crashing or becoming unresponsive, thereby disrupting DNS resolution for the targeted system. The affected versions include several releases of IBM's AIX operating system (versions 2, 4.3, 5, 5.7, and 7), which incorporate BIND named as part of their network services. The CVSS score of 2.1 (low severity) reflects that the attack requires local access (AV:L), has low complexity (AC:L), does not require authentication (Au:N), and impacts availability only (A:P) without affecting confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild, indicating limited active threat exploitation. Given the age of the vulnerability (published in 1999) and the specific affected platforms, the threat is mostly relevant to legacy systems still running these older AIX versions with vulnerable BIND named implementations. Modern systems and updated BIND versions are not impacted by this issue.

Potential Impact

For European organizations, the impact of CVE-1999-0851 is generally low due to the vulnerability's age, low CVSS score, and the requirement for local access to exploit it. However, organizations that continue to operate legacy IBM AIX systems with the affected BIND versions could face service disruptions if an attacker gains local access and triggers the DoS condition. This could lead to temporary loss of DNS resolution services on critical infrastructure, affecting internal network operations and potentially external-facing services relying on the affected DNS servers. The disruption could impact business continuity, especially in environments where legacy AIX systems are integral to network operations or DNS infrastructure. Since no known exploits exist in the wild and no patches are available, the risk is mitigated primarily by limiting local access and upgrading or isolating vulnerable systems. The threat is less relevant to organizations that have migrated to modern operating systems or updated DNS software.

Mitigation Recommendations

Given the absence of patches, European organizations should focus on compensating controls to mitigate this vulnerability. First, restrict local access to systems running vulnerable BIND named services by enforcing strict access controls, network segmentation, and limiting administrative privileges. Second, monitor and audit local activities on these systems to detect any unusual or unauthorized attempts to interact with the DNS service. Third, consider upgrading or migrating legacy AIX systems to supported versions or alternative platforms with updated DNS implementations that do not contain this vulnerability. Fourth, if upgrading is not immediately feasible, isolate vulnerable systems from critical network segments and external access to reduce the attack surface. Finally, implement robust incident response plans to quickly address any service disruptions caused by potential exploitation attempts.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df3dc

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 1:57:07 PM

Last updated: 8/12/2025, 4:16:06 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats