Skip to main content

CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi

Medium
VulnerabilityCVE-1999-1254cve-1999-1254denial of service
Published: Mon Mar 08 1999 (03/08/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:11:39 UTC

Technical Analysis

CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.

Mitigation Recommendations

Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deee3

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:11:39 PM

Last updated: 7/28/2025, 8:43:55 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats