First published: Sun Feb 01 1998(Updated: )
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =2.2.5 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.0 | |
FreeBSD Kernel | =2.2 | |
BSDI BSD/OS | ||
=2.2 | ||
=2.2.5 | ||
=2.0 | ||
=2.1 | ||
=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0305 has a high severity rating due to its potential for allowing remote attackers to spoof TCP connections.
To fix CVE-1999-0305, ensure that source routing is disabled in your system configuration.
CVE-1999-0305 affects OpenBSD versions 2.0-2.2 and FreeBSD versions 2.2-2.2.5.
Yes, CVE-1999-0305 can be exploited remotely due to improper restrictions on source routed packets.
CVE-1999-0305 facilitates TCP spoofing attacks, allowing attackers to intercept or manipulate network traffic.