Vulnerability Name:

CVE-1999-0831 (CCN-3552)

Assigned:1999-11-19
Published:1999-11-19
Updated:2008-09-09
Summary:Denial of service in Linux syslogd via a large number of connections.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CALDERA
Type: UNKNOWN
CSSA-1999-035.0

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-1999-035.0
DoS with sysklogd, glibc

Source: CCN
Type: CAU Technologies, Inc. Security Advisory 2000.05.19.001
Risk of server DoS and/or preventing syslog from logging

Source: MITRE
Type: CNA
CVE-1999-0831

Source: CCN
Type: RHSA-1999:055-01
syslogd

Source: BID
Type: UNKNOWN
809

Source: CCN
Type: BID-809
Linux syslogd Denial of Service Vulnerability

Source: CCN
Type: SuSE Security Announcement #31
syslogd-1.3.33 (a1)

Source: XF
Type: UNKNOWN
linux-syslogd-dos(3552)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cobalt:qube:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:cobalt:qube:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:cobalt_raq:1.1:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-1999-0831 (CCN-3727)

    Assigned:1999-11-30
    Published:1999-11-30
    Updated:1999-11-30
    Summary:Slackware is vulnerable to a denial of service attack, caused by a vulnerability in the syslogd package. A remote attacker using a Slackware system can open multiple connections to syslogd to cause Slackware to hang.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: BugTraq Mailing List, Tue Nov 30 1999 - 21:24:25 CST
    [david@slackware.com: New Patches for Slackware 4.0 Available]

    Source: MITRE
    Type: CNA
    CVE-1999-0831

    Source: CCN
    Type: BID-809
    Linux syslogd Denial of Service Vulnerability

    Source: CCN
    Type: Slackware Web site
    The Slackware Linux Project

    Source: XF
    Type: UNKNOWN
    slackware-syslogd-dos(3727)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cobalt qube 1.0
    cobalt qube 2.0
    sun cobalt raq 1.1
    sun cobalt raq 2 *
    sun cobalt raq 3i *
    debian debian linux 2.2
    suse suse linux 6.2
    suse suse linux 6.3
    linux linux kernel *
    slackware slackware linux 4.0