<?xml version='1.0' encoding='UTF-8'?><nvdxmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xmlns="http://nvd.nist.gov/feeds/cve/1.2"nvd_xml_version="1.2"pub_date="2017-05-12"xsi:schemaLocation="http://nvd.nist.gov/feeds/cve/1.2 https://scap.nist.gov/schema/nvd/nvd-cve-feed_1.2.1.xsd"><entrytype="CVE"name="CVE-1999-0001"seq="1999-0001"published="1999-12-30"modified="2010-12-16"severity="Medium"CVSS_version="2.0"CVSS_score="5.0"CVSS_base_score="5.0"CVSS_impact_subscore="2.9"CVSS_exploit_subscore="10.0"CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)"><desc><descriptsource="cve">ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.</descript></desc><loss_types><avail/></loss_types><range><network/></range><refs><refsource="CONFIRM"url="http://www.openbsd.org/errata23.html#tcpfix">http://www.openbsd.org/errata23.html#tcpfix</ref></refs><vuln_soft><prodname="freebsd"vendor="freebsd"><versnum="1.1.5.1"/><versnum="2.2.8"/><versnum="2.2"/><versnum="1.0"/><versnum="2.1.7"/><versnum="2.2.6"/><versnum="2.1.6.1"/><versnum="3.0"/><versnum="2.0"/><versnum="2.1.7.1"/><versnum="1.1"/><versnum="2.2.2"/><versnum="1.2"/><versnum="2.0.5"/><versnum="2.2.3"/><versnum="2.0.1"/><versnum="2.1.5"/><versnum="2.2.4"/><versnum="2.1.6"/><versnum="2.2.5"/></prod><prodname="bsd_os"vendor="bsdi"><versnum="3.1"/></prod><prodname="openbsd"vendor="openbsd"><versnum="2.4"/><versnum="2.3"/></prod></vuln_soft></entry>