Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0867: Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers.

0
Medium
VulnerabilityCVE-1999-0867cve-1999-0867denial of servicecwe-20
Published: Wed Aug 11 1999 (08/11/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: commercial_internet_system

Description

Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:13:43 UTC

Technical Analysis

CVE-1999-0867 is a vulnerability affecting Microsoft Internet Information Services (IIS) versions 2.0, 2.5, 3.0, and 4.0. The issue is a denial of service (DoS) condition triggered by sending a flood of HTTP requests containing malformed headers to the IIS server. Specifically, the server fails to properly handle these malformed HTTP headers, which can cause the service to crash or become unresponsive. This vulnerability stems from improper input validation (CWE-20), where the server does not adequately check the structure and content of incoming HTTP headers before processing them. Since IIS is a widely used web server platform, especially in the late 1990s and early 2000s, this vulnerability could be exploited remotely without any authentication or user interaction, simply by overwhelming the server with crafted HTTP requests. The CVSS score of 5.0 (medium severity) reflects that while the vulnerability does not impact confidentiality or integrity, it can significantly affect availability by causing service outages. A patch addressing this issue was released by Microsoft as part of security bulletin MS99-029. No known exploits have been reported in the wild, but the vulnerability remains a concern for legacy systems still running these IIS versions. Given the age of the affected software, modern IIS versions are not impacted by this vulnerability.

Potential Impact

For European organizations, the primary impact of CVE-1999-0867 is the potential disruption of web services hosted on vulnerable IIS versions. Organizations relying on legacy IIS servers for critical web applications or internal services could experience denial of service conditions, leading to downtime and loss of availability. This could affect business operations, customer access, and internal communications. Although the vulnerability does not compromise data confidentiality or integrity, the unavailability of web services can have significant operational and reputational consequences. Additionally, in sectors such as government, finance, and healthcare, where web service availability is critical, such disruptions could lead to regulatory non-compliance or loss of trust. However, given the age of the affected IIS versions, most European organizations are unlikely to be running these outdated systems in production environments. The risk is primarily to legacy or unsupported systems that have not been updated or decommissioned.

Mitigation Recommendations

European organizations should prioritize upgrading or replacing any IIS servers running versions 2.0, 2.5, 3.0, or 4.0 with supported, modern versions of IIS or alternative web server platforms. Applying the official Microsoft patch MS99-029 is essential for any remaining legacy systems to remediate this vulnerability. Network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) can be configured to detect and block malformed HTTP headers and abnormal request floods, reducing exposure to exploitation attempts. Rate limiting and traffic anomaly detection should be implemented to mitigate denial of service attacks. Regular vulnerability scanning and asset inventory management will help identify any legacy IIS deployments. Organizations should also enforce strict network segmentation to isolate legacy systems and monitor logs for unusual HTTP traffic patterns. Finally, decommissioning unsupported IIS versions and migrating services to secure, maintained platforms is the most effective long-term mitigation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df174

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:13:43 PM

Last updated: 2/7/2026, 6:23:47 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats