Skip to main content

CVE-1999-1291: TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote at

Medium
VulnerabilityCVE-1999-1291cve-1999-1291
Published: Mon Oct 05 1998 (10/05/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:27:51 UTC

Technical Analysis

CVE-1999-1291 is a vulnerability in the TCP/IP implementation of Microsoft Windows 95, Windows NT 4.0, and potentially other versions. The flaw allows remote attackers to forcibly reset active TCP connections by exploiting the way the TCP/IP stack handles reset (RST) packets. Specifically, an attacker can send a packet with the PSH and ACK flags set or use other methods to trigger the target system to respond with a packet containing the last sequence number used in the connection. With this sequence number, the attacker can craft a spoofed TCP reset packet that appears legitimate to the target, causing the connection to be terminated unexpectedly. This attack does not compromise confidentiality or integrity of data but impacts availability by disrupting ongoing TCP sessions. The vulnerability requires no authentication and can be executed remotely over the network. The CVSS score of 5.0 (medium severity) reflects the ease of exploitation and the limited impact scope, as it only affects availability and does not allow data theft or code execution. No patches are available for this vulnerability, and there are no known exploits actively used in the wild. However, the affected operating systems are legacy and largely obsolete, which reduces the current practical risk but may still be relevant in legacy or industrial environments where such systems remain in use.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of network services relying on affected Windows 95 or Windows NT 4.0 systems. Although these operating systems are outdated and rarely used in modern enterprise environments, some legacy systems in industrial control, manufacturing, or specialized embedded environments may still be operational. An attacker exploiting this vulnerability could cause denial of service by resetting critical TCP connections, potentially interrupting business processes, remote management sessions, or data transfers. Since the vulnerability does not allow data interception or modification, the confidentiality and integrity of communications are not directly at risk. However, availability disruptions could lead to operational delays, loss of productivity, or complications in environments where continuous connectivity is essential. Given the lack of patches, organizations relying on these legacy systems must consider compensating controls or system upgrades to mitigate risk.

Mitigation Recommendations

Given the absence of official patches, European organizations should prioritize the following mitigation strategies: 1) Upgrade legacy Windows 95 and Windows NT 4.0 systems to supported, modern operating systems that have robust TCP/IP stack implementations and receive security updates. 2) Where upgrades are not immediately feasible, isolate legacy systems from untrusted networks by placing them behind firewalls or network segmentation to restrict exposure to potential attackers. 3) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious TCP reset packets or anomalous TCP traffic patterns indicative of reset spoofing attempts. 4) Employ VPNs or encrypted tunnels for remote access to legacy systems to reduce the risk of spoofed packets originating from outside trusted networks. 5) Monitor network traffic for unusual connection resets or disruptions that could indicate exploitation attempts. 6) Develop incident response plans that include procedures for handling denial-of-service conditions caused by TCP reset spoofing. These steps go beyond generic advice by focusing on compensating controls tailored to legacy system constraints and network architecture.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deaf0

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:27:51 PM

Last updated: 7/31/2025, 2:13:53 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats