Windows NT Local Security Authority (LSA) can be remotely crashed, requiring a system reboot |
---|
Risk Level: | Medium | Check or Attack Name: MsrpcLsaLookupnamesDos |
---|---|---|
Platforms: | Windows NT: 4.0 SP4, Windows NT: 4.0 SP5 | |
Description: | A potentially serious denial of service attack on the Windows NT Local Security Authority (LSA) service could allow a remote attacker to crash this service by making a malformed request to LsaLookupNames. In most cases, the system will have to be rebooted to regain normal functionality. |
|
Remedy: | Apply the Windows NT 4.0 post-SP5 LSA3-fix update. This fix can be installed on Windows NT 4.0 Service Pack 4 and Service Pack 5. Windows NT 4.0 Service Pack 4 (SP4) and SP5 users, apply the LSA3-fix update:
|
|
References: | Microsoft Security Bulletin MS99-020, Patch Available for "Malformed LSA Request" Vulnerability, http://www.microsoft.com/security/bulletins/ms99-020.asp Microsoft Knowledge Base Article Q231457, Malformed Request Causes LSA Service to Hang, http://support.microsoft.com/support/kb/articles/q231/4/57.asp BindView Development, Phantom Technical Advisory, http://www.bindview.com/security/advisory/phantom_a.html CIAC Information Bulletin J-049, J-049: Windows NT, Two Denial-of-Service Vulnerabilities (Malformed LSA Request and CSRSS Worker Thread Exhaustion), http://ciac.llnl.gov/ciac/bulletins/j-049.shtml |
Know Your Risks |