First published: Thu Jul 15 1999(Updated: )
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =1.1.5.1 | |
FreeBSD Kernel | =2.0 | |
FreeBSD Kernel | =2.0.5 | |
FreeBSD Kernel | =2.1.0 | |
FreeBSD Kernel | =2.1.5 | |
FreeBSD Kernel | =2.1.6 | |
FreeBSD Kernel | =2.1.7.1 | |
FreeBSD Kernel | =2.2.2 | |
FreeBSD Kernel | =2.2.3 | |
FreeBSD Kernel | =2.2.4 | |
FreeBSD Kernel | =2.2.5 | |
FreeBSD Kernel | =2.2.6 | |
FreeBSD Kernel | =2.2.8 | |
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =3.1 | |
FreeBSD Kernel | =3.2 | |
NetBSD current | =1.3.1 | |
NetBSD current | =1.3.2 | |
NetBSD current | =1.3.3 | |
NetBSD current | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1518 is classified as a denial of service vulnerability that can be exploited by an unauthenticated user.
To remediate CVE-1999-1518, upgrade to a version of FreeBSD or NetBSD that is not affected by this vulnerability.
CVE-1999-1518 affects multiple versions of FreeBSD and NetBSD, specifically versions 1.1.5.1 through 3.2 for FreeBSD and some versions of NetBSD.
CVE-1999-1518 enables a denial of service attack through memory allocation exploits using mmap or shmget.
Currently, there are no specific workarounds for CVE-1999-1518 other than applying security patches or upgrades provided by the operating system vendor.