First published: Wed Dec 08 1999(Updated: )
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =2.1 | |
Red Hat Linux | =5.2 | |
Linux Kernel | =2.0.37 | |
Linux Kernel | =2.0.34 | |
Linux Kernel | =2.0 | |
Linux Kernel | =2.0.36 | |
Linux Kernel | =2.0.38 | |
Linux Kernel | =2.0.35 | |
=2.1 | ||
=2.0 | ||
=2.0.34 | ||
=2.0.35 | ||
=2.0.36 | ||
=2.0.37 | ||
=2.0.38 | ||
=5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0986 has been classified as a denial of service vulnerability.
To mitigate CVE-1999-0986, avoid using the ping command with the -R option or upgrade to a patched version of the Linux kernel.
CVE-1999-0986 affects Linux Kernel versions 2.0.3x and specific distributions like Debian 2.1 and Red Hat Linux 5.2.
CVE-1999-0986 cannot be exploited remotely as it requires local user access to the system.
In the context of CVE-1999-0986, the -R option in the ping command allows the sender to record the route packets take, which can be exploited to cause a denial of service.