Skip to main content

CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC

Medium
VulnerabilityCVE-1999-1201cve-1999-1201denial of service
Published: Sat Feb 06 1999 (02/06/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:55:18 UTC

Technical Analysis

CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.

Potential Impact

For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.

Mitigation Recommendations

Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dedf7

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:55:18 PM

Last updated: 7/31/2025, 2:10:31 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats