Windows NT denial of service attack

Risk Level: Medium risk vulnerability  Medium

Check or Attack Name: Windows NT SMB logon DoS

Platforms: Windows NT
Description:

Windows NT servers (including those with Service Pack 3 when all hotfixes applied) are vulnerable to a denial of service attack. When a logon request is initiated to access the SMB/CIFS service and the SMB logon packet is incorrectly processed, memory corruption results in the NT kernel. When this happens, a blue screen error message appears and the machine has to be rebooted.

Remedy:

Apply the following patch from Microsoft available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP3/srv-fix.

References:

Microsoft Knowledge Base Article Q180963, Denial of Service Attack Causes Windows NT Systems to Restart, http://support.microsoft.com/support/kb/articles/Q180/9/63.asp

Network Associates, Inc. Security Advisory #25, Windows NT Logon Denial of Service, http://www.nai.com/nai_labs/asp_set/advisory/25_windows_nt_dos_adv.asp


X-Force Logo
Know Your Risks