Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC

0
Medium
VulnerabilityCVE-1999-1201cve-1999-1201denial of service
Published: Sat Feb 06 1999 (02/06/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:55:18 UTC

Technical Analysis

CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.

Potential Impact

For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.

Mitigation Recommendations

Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dedf7

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:55:18 PM

Last updated: 2/7/2026, 8:42:41 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats