5
CVSSv2

CVE-1999-0016

Published: 01/12/1997 Updated: 09/09/2008
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 526
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Land IP denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 7000

gnu inet 5.01

microsoft winsock 2.0

hp hp-ux 9.04

hp hp-ux 9.05

hp hp-ux 9.07

microsoft windows 95

hp hp-ux 10.16

hp hp-ux 10.20

hp hp-ux 10.24

hp hp-ux 10.30

hp hp-ux 10.01

hp hp-ux 9.00

hp hp-ux 9.03

microsoft windows nt 4.0

netbsd netbsd 1.1

sun sunos 4.1.4

hp hp-ux 10.00

hp hp-ux 10.10

hp hp-ux 11.00

hp hp-ux 9.01

netbsd netbsd 1.0

sun sunos 4.1.3u1

Exploits

/* source: wwwsecurityfocuscom/bid/2666/info A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port When a packet of this sort is received, an infinite loop is initiated and the affected system halts This i ...
/* source: wwwsecurityfocuscom/bid/2666/info A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port When a packet of this sort is received, an infinite loop is initiated and the affected system halts Thi ...
/* source: wwwsecurityfocuscom/bid/2666/info A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port When a packet of this sort is received, an infinite loop is initiated and the affected system halts This ...
source: wwwsecurityfocuscom/bid/2666/info A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port When a packet of this sort is received, an infinite loop is initiated and the affected system halts This is ...
/* source: wwwsecurityfocuscom/bid/2666/info A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port When a packet of this sort is received, an infinite loop is initiated and the affected system halts Th ...

Github Repositories

OpenSIMS 1.0

OpenSIMS 10 Below is the README as it was packaged up for the last release on June 14th, 2008 Email and web addresses may or may not still be used This is just for preservation on something other than SourceForge (currently) since SourceForge has apparently sold their soul to the devil OpenSIMS / AgentSDK / Ceteri $CVSId: README,v 196 2006/05/18 23:05:20 mikee Exp $ $Id: R

A simple dos-tool

CVE-1999-0016-Land-DOS-tool DISCLAIMER: This tool is for educational purposes only This tool can be used to check if a target has the CVE-1999-0016 vulnerability The tool is zero effort, so it is not pretty nor does it handle any potential errors But it works as a zero effort POC Requires the library Scapy