Vulnerability Name:

CVE-1999-1518 (CCN-2351)

Assigned:1999-07-15
Published:1999-07-15
Updated:2017-12-19
Summary:Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Thu, 15 Jul 1999 00:36:12 -0500
Shared memory DoS's

Source: MITRE
Type: CNA
CVE-1999-1518

Source: BUGTRAQ
Type: UNKNOWN
19990715 Shared memory DoS's

Source: CCN
Type: OSVDB ID: 13553
Multiple Unix Vendor BSD Based Memory Implementation Memory Limits Bypass

Source: BID
Type: Exploit, Patch, Vendor Advisory
526

Source: CCN
Type: BID-526
Multiple Vendor Shared Memory Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
bsd-shared-memory-dos(2351)

Source: XF
Type: UNKNOWN
bsd-shared-memory-dos(2351)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 1.1.5.1
    freebsd freebsd 2.0
    freebsd freebsd 2.0.5
    freebsd freebsd 2.1.0
    freebsd freebsd 2.1.5
    freebsd freebsd 2.1.6
    freebsd freebsd 2.1.7.1
    freebsd freebsd 2.2.2
    freebsd freebsd 2.2.3
    freebsd freebsd 2.2.4
    freebsd freebsd 2.2.5
    freebsd freebsd 2.2.6
    freebsd freebsd 2.2.8
    freebsd freebsd 3.0
    freebsd freebsd 3.1
    freebsd freebsd 3.2
    netbsd netbsd 1.3.1
    netbsd netbsd 1.3.2
    netbsd netbsd 1.3.3
    netbsd netbsd 1.4
    windriver bsdos *
    freebsd freebsd *
    netbsd netbsd *