Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0999: Microsoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS p

0
Medium
VulnerabilityCVE-1999-0999cve-1999-0999denial of servicecwe-20
Published: Fri Nov 19 1999 (11/19/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: sql_server

Description

Microsoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS packet.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:43:00 UTC

Technical Analysis

CVE-1999-0999 is a vulnerability affecting Microsoft SQL Server version 7.0, where a remote attacker can cause a denial of service (DoS) condition by sending a malformed Tabular Data Stream (TDS) packet to the server. TDS is the protocol used by Microsoft SQL Server to communicate between clients and the database server. The vulnerability arises due to insufficient input validation (classified under CWE-20: Improper Input Validation) in the handling of TDS packets, which allows specially crafted packets to disrupt normal server operations. Exploiting this flaw does not require authentication, making it remotely exploitable over the network. The attack results in a denial of service, impacting the availability of the SQL Server instance but does not compromise confidentiality or integrity of the data. The CVSS v2 base score is 4.3 (medium severity) with vector AV:N/AC:M/Au:N/C:N/I:N/A:P, indicating network attack vector, medium attack complexity, no authentication required, and impact limited to availability. Microsoft released a security bulletin (MS99-059) providing patches to address this vulnerability. There are no known exploits in the wild documented for this vulnerability, likely due to its age and the obsolescence of SQL Server 7.0. However, unpatched legacy systems remain at risk of DoS attacks that could disrupt business operations relying on this database platform.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of critical database services running Microsoft SQL Server 7.0. Although this version is very old and largely replaced by newer versions, some legacy systems may still be in operation, especially in industries with long software lifecycles or where costly upgrades have been deferred. A successful DoS attack could lead to downtime of applications dependent on the database, affecting business continuity, customer service, and internal operations. Since the vulnerability does not allow data theft or modification, the confidentiality and integrity risks are minimal. However, availability disruptions can still cause financial losses, reputational damage, and operational delays. Organizations in sectors such as finance, manufacturing, healthcare, and government, which often rely on stable database services, could be particularly affected if legacy SQL Server 7.0 instances are exposed to untrusted networks. The risk is mitigated by the availability of patches and the general obsolescence of the affected software.

Mitigation Recommendations

European organizations should first conduct an inventory to identify any remaining Microsoft SQL Server 7.0 installations exposed to external or internal networks. Immediate mitigation involves applying the official patch provided by Microsoft in security bulletin MS99-059 to fix the vulnerability. If patching is not feasible due to legacy dependencies, organizations should isolate these servers from untrusted networks using network segmentation and firewall rules to restrict access to trusted hosts only. Implementing intrusion detection/prevention systems (IDS/IPS) to monitor and block malformed TDS packets can provide additional protection. Regularly monitoring SQL Server logs for unusual connection attempts or packet anomalies can help detect exploitation attempts early. Organizations should also plan for upgrading legacy SQL Server instances to supported versions to eliminate exposure to this and other vulnerabilities. Finally, maintaining up-to-date backups and having a tested incident response plan will help minimize downtime in case of a successful DoS attack.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df41c

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 1:43:00 PM

Last updated: 2/7/2026, 4:31:31 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats