Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0173: Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of

0
Medium
VulnerabilityCVE-2000-0173cve-2000-0173denial of service
Published: Fri Mar 10 2000 (03/10/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: unixware

Description

Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service.

AI-Powered Analysis

AILast updated: 06/30/2025, 23:12:57 UTC

Technical Analysis

CVE-2000-0173 is a medium severity vulnerability affecting the EELS (Enhanced Event Logging System) component in SCO UnixWare versions 7.1 and 7.1.1. This vulnerability allows remote attackers to cause a denial of service (DoS) condition without requiring authentication or user interaction. The attack vector is network-based (AV:N), meaning an attacker can exploit this vulnerability remotely over the network. The vulnerability does not impact confidentiality or integrity but solely affects availability (A:P). Specifically, an attacker can send crafted network packets or requests to the EELS system, triggering a failure or crash that disrupts normal system operations. Since the EELS system is responsible for event logging, its failure can also hinder system monitoring and incident response capabilities. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability was published in March 2000, indicating it is an old issue, but it remains relevant for organizations still running these legacy UnixWare versions. The lack of authentication requirements and ease of exploitation (low attack complexity) make it a straightforward DoS vector for attackers targeting affected systems.

Potential Impact

For European organizations still operating SCO UnixWare 7.1 or 7.1.1 systems, this vulnerability poses a risk of service disruption through denial of service attacks. The impact is primarily on system availability, potentially causing downtime of critical services hosted on these UnixWare systems. This can affect business continuity, especially in sectors relying on legacy UnixWare infrastructure such as manufacturing, telecommunications, or government agencies that have not migrated to modern platforms. Additionally, the failure of the EELS system impairs event logging and monitoring, reducing the ability to detect and respond to other security incidents. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to operational delays and financial losses. Given the age of the vulnerability and the niche use of SCO UnixWare, the overall risk to most European organizations is limited but should not be ignored in environments where these systems remain in production.

Mitigation Recommendations

Since no official patch is available, organizations should consider the following specific mitigation strategies: 1) Isolate affected UnixWare 7.1/7.1.1 systems from untrusted networks by implementing strict network segmentation and firewall rules to limit exposure to potential attackers. 2) Monitor network traffic for unusual or malformed packets targeting the EELS system ports and implement intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 3) Where possible, disable or restrict the EELS service if it is not critical to operations, reducing the attack surface. 4) Plan and execute migration away from SCO UnixWare 7.1.x to supported and actively maintained operating systems to eliminate exposure to this and other legacy vulnerabilities. 5) Maintain comprehensive backups and incident response plans to quickly recover from potential DoS incidents. 6) Conduct regular security assessments and penetration testing focusing on legacy systems to identify and mitigate similar risks.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df8ea

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 11:12:57 PM

Last updated: 2/3/2026, 12:53:13 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats