Vulnerability Name:

CVE-1999-0524 (CCN-8812)

Assigned:1997-08-01
Published:1997-08-01
Updated:2022-11-14
Summary:ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
CVSS v3 Severity:0.0 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
0.0 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
CWE-noinfo
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-1999-0524

Source: MISC
Type: Broken Link
http://descriptions.securescout.com/tc/11010

Source: MISC
Type: Broken Link
http://descriptions.securescout.com/tc/11011

Source: CONFIRM
Type: Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

Source: MISC
Type: Third Party Advisory
http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1434

Source: OSVDB
Type: Broken Link
95

Source: XF
Type: Third Party Advisory, VDB Entry
icmp-netmask(306)

Source: XF
Type: Third Party Advisory, VDB Entry
icmp-timestamp(322)

Source: XF
Type: UNKNOWN
icmp-timestamp-request(8812)

Source: CONFIRM
Type: Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10053

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows:-:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:-:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:-:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:-:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:-:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:-:*:*:*:*:*:*:*
  • OR cpe:/o:apple:macos:-:*:*:*:*:*:*:*
  • OR cpe:/o:oracle:solaris:-:*:*:*:*:*:-:*
  • OR cpe:/o:novell:netware:-:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:-:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:os2:-:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:-:*:*:*:*:*:*:*
  • OR cpe:/o:sco:sco_unix:-:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows -
    cisco ios -
    apple mac os x -
    linux linux kernel -
    hp hp-ux -
    ibm aix -
    apple macos -
    oracle solaris -
    novell netware -
    windriver bsdos -
    ibm os2 -
    hp tru64 -
    sco sco unix -
    sgi irix -