ID

VAR-199910-0025


CVE

CVE-1999-0905


TITLE

Axent Raptor Denial of Service Vulnerability

Trust: 0.9

sources: BID: 736 // CNNVD: CNNVD-199910-034

DESCRIPTION

Denial of service in Axent Raptor firewall via malformed zero-length IP options. According to an advisory posted to bugtraq by the perdue CERIAS labs, setting the SECURITY and TIMESTAMP IP options length to 0 can cause an infinite loop to occur within the code that handles the options (resulting in the software freezing). A consequence of this is a remote denial of service. This vulnerability can be caused by an incorrect zero-length IP option

Trust: 1.26

sources: NVD: CVE-1999-0905 // BID: 736 // VULHUB: VHN-886

AFFECTED PRODUCTS

vendor:axentmodel:raptor firewallscope:eqversion:*

Trust: 1.0

vendor:axentmodel:raptor firewallscope: - version: -

Trust: 0.6

vendor:axentmodel:raptorscope:eqversion:6.0

Trust: 0.3

sources: BID: 736 // CNNVD: CNNVD-199910-034 // NVD: CVE-1999-0905

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-1999-0905
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-199910-034
value: MEDIUM

Trust: 0.6

VULHUB: VHN-886
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-1999-0905
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-886
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-886 // CNNVD: CNNVD-199910-034 // NVD: CVE-1999-0905

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-1999-0905

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-199910-034

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-199910-034

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-886

EXTERNAL IDS

db:BIDid:736

Trust: 2.0

db:OSVDBid:1121

Trust: 1.7

db:NVDid:CVE-1999-0905

Trust: 1.7

db:CNNVDid:CNNVD-199910-034

Trust: 0.7

db:EXPLOIT-DBid:19564

Trust: 0.1

db:VULHUBid:VHN-886

Trust: 0.1

sources: VULHUB: VHN-886 // BID: 736 // CNNVD: CNNVD-199910-034 // NVD: CVE-1999-0905

REFERENCES

url:http://www.securityfocus.com/bid/736

Trust: 2.7

url:http://www.osvdb.org/1121

Trust: 2.7

url: -

Trust: 0.1

sources: VULHUB: VHN-886 // CNNVD: CNNVD-199910-034 // NVD: CVE-1999-0905

CREDITS

This was discovered by the CERIAS labs at perdue (cs.perdue.edu) and posted to BugTraq on October 21, 1999.

Trust: 0.9

sources: BID: 736 // CNNVD: CNNVD-199910-034

SOURCES

db:VULHUBid:VHN-886
db:BIDid:736
db:CNNVDid:CNNVD-199910-034
db:NVDid:CVE-1999-0905

LAST UPDATE DATE

2024-11-22T23:15:57.957000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-886date:2008-09-09T00:00:00
db:BIDid:736date:1999-10-21T00:00:00
db:CNNVDid:CNNVD-199910-034date:2005-05-02T00:00:00
db:NVDid:CVE-1999-0905date:2024-11-20T23:29:49.007

SOURCES RELEASE DATE

db:VULHUBid:VHN-886date:1999-10-21T00:00:00
db:BIDid:736date:1999-10-21T00:00:00
db:CNNVDid:CNNVD-199910-034date:1999-10-21T00:00:00
db:NVDid:CVE-1999-0905date:1999-10-21T04:00:00