CVE-1999-0016

MEDIUM5.0/ 10.0
Share:
Published: December 1, 1997 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Land IP denial of service.

CVSS Metrics

Base Score
5.0
Severity
MEDIUM
Vector String
AV:N/AC:L/Au:N/C:N/I:N/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Land Attack (CVE-1999-0016) is a classic denial-of-service (DoS) vulnerability that can cripple network services by sending a malformed TCP packet. This attack exploits a flaw in how network stacks handle packets with the same source and destination IP address and port, leading to resource exhaustion and service disruption. The impact can range from temporary outages to complete network unavailability.

02 // Vulnerability Mechanism

Step 1: Packet Crafting: The attacker crafts a TCP SYN packet.

Step 2: Identical Source/Destination: The crafted packet is configured with the same source and destination IP address and port number.

Step 3: Packet Transmission: The attacker sends the malformed packet to the target system.

Step 4: Target Processing: The target system receives the packet and attempts to process it.

Step 5: Resource Exhaustion: The target system, due to the identical source and destination, enters a state of resource exhaustion, potentially leading to a denial of service.

03 // Deep Technical Analysis

Root Cause: The Land Attack exploits a vulnerability in the TCP/IP stack's handling of packets where the source and destination IP address and port are identical. When a crafted TCP SYN packet is sent with the same source and destination IP and port, the target system attempts to establish a connection with itself. This can lead to an infinite loop or resource exhaustion, as the system may repeatedly try to respond to the malformed packet, consuming CPU cycles and network bandwidth. The specific flaw lies in the lack of proper validation or filtering of packets with identical source and destination information, leading to a denial of service. This is not a buffer overflow or race condition in the traditional sense, but rather a logic flaw in packet processing.

CVE-1999-0016 - MEDIUM Severity (5) | Free CVE Database | 4nuxd