Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-1999-0524 PoC — Linux kernel 信息泄露漏洞

Source
Associated Vulnerability
Title:Linux kernel 信息泄露漏洞 (CVE-1999-0524)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在信息泄露漏洞,该漏洞源于ICMP信息如netmask和timestamp允许任意主机访问。
Description
A reconnaissance tool to detect CVE-1999-0524 (ICMP Timestamp Disclosure) by automating timestamp extraction via nping or hping3. Converts raw ICMP timestamps into human-readable remote system times for vulnerability validation.
Readme
# ICMP Timestamp Disclosure POC (CVE-1999-0524)

<a href="https://ibb.co/jvVtppFM"><img src="https://i.ibb.co/ccbqmmdF/icmp-poc1.png" alt="icmp-poc1" border="0"></a>

This Proof-of-Concept script demonstrates the **CVE-1999-0524** vulnerability, which allows remote attackers to obtain a target system's current date and time via **ICMP timestamp responses**.

---

## 🛡️ Vulnerability Information

- **CVE ID:** CVE-1999-0524  
- **Severity:** Low (Information Disclosure)  
- **Affected Systems:** Any system that responds to ICMP timestamp requests (Type 13)  
- **Impact:** Remote disclosure of system time  

---

## ✨ Features

- Automatically retrieves ICMP timestamps using either `nping` or `hping3`
- Manual mode for analyzing captured timestamps
- Converts timestamps to human-readable time format
- Vulnerability assessment with color-coded output
- Supports custom UTC dates for analysis
- Banner suppression option for scripting

---

## ⚙️ Requirements

- Linux-based operating system
- `nping` (from the Nmap package) or `hping3`
- Sudo privileges (for sending ICMP requests)
- Bash 4.0+

---

## 📦 Installation

### Install Required Tools

```bash
sudo apt update
sudo apt install nmap hping3
File Snapshot

[4.0K] /data/pocs/767e026810ad090b138ce1fe684e79f37ee7625e ├── [5.5K] icmp_timestamp.sh └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.