Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1018: IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the he

0
High
VulnerabilityCVE-1999-1018cve-1999-1018
Published: Tue Jul 27 1999 (07/27/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:09:56 UTC

Technical Analysis

CVE-1999-1018 is a high-severity vulnerability affecting the IPChains firewall implementation in Linux kernels version 2.2.10 and earlier. The core issue lies in the way IPChains handles fragmented IP packets. Specifically, the kernel does not reassemble IP fragments before applying filtering rules to the packet headers. Attackers can exploit this by sending multiple IP fragments with zero offsets, effectively bypassing firewall rules that rely on header inspection. This means that malicious traffic can evade detection and filtering, potentially allowing unauthorized access or the delivery of harmful payloads. Since IPChains was the standard Linux firewall tool before being replaced by iptables, systems running these older kernels are vulnerable. The vulnerability allows remote attackers to bypass network filtering without authentication or user interaction, impacting confidentiality, integrity, and availability. Although no patches are available for this vulnerability, it is well-documented and scored 7.5 on the CVSS scale, indicating a high risk. No known exploits in the wild have been reported, but the fundamental nature of the flaw makes it a significant threat to unpatched legacy systems.

Potential Impact

For European organizations still operating legacy Linux systems with kernels 2.2.10 or earlier, this vulnerability poses a serious risk. The ability to bypass firewall rules can lead to unauthorized network access, data exfiltration, or the introduction of malware. Critical infrastructure, government agencies, and enterprises relying on outdated Linux distributions could face disruptions or breaches. The impact extends to confidentiality (exposure of sensitive data), integrity (tampering with data or communications), and availability (potential denial of service through malicious traffic). Given the age of the vulnerability, most modern systems are not affected; however, legacy systems in industrial control environments or embedded devices may still be vulnerable. The lack of patch availability means organizations must rely on compensating controls or system upgrades to mitigate risk.

Mitigation Recommendations

Since no official patch exists for this vulnerability, European organizations should prioritize upgrading affected Linux kernels to versions beyond 2.2.10 where IP fragment reassembly is properly handled before filtering. If upgrading is not immediately feasible, organizations should implement network-level controls such as deploying modern firewall appliances or intrusion prevention systems that can detect and block fragmented packet evasion techniques. Network segmentation can limit exposure of vulnerable systems. Additionally, monitoring network traffic for unusual fragmentation patterns and applying strict ingress filtering at network boundaries can reduce attack surface. For embedded or legacy devices, consider isolating them from critical networks or replacing them with supported hardware and software. Regular vulnerability assessments and audits should include checks for outdated kernel versions to identify at-risk systems.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df117

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:09:56 PM

Last updated: 2/7/2026, 1:53:45 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats