Vulnerabilities > CVE-1999-0288 - Unspecified vulnerability in Microsoft Windows NT 4.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Exploit-Db
description | Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 DoS Duplicate Hostname Vulnerability. CVE-1999-0288. Dos exploit for windows platform |
id | EDB-ID:19238 |
last seen | 2016-02-02 |
modified | 1999-06-04 |
published | 1999-06-04 |
reporter | Carl Byington |
source | https://www.exploit-db.com/download/19238/ |
title | Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 - DoS Duplicate Hostname Vulnerability |
Nessus
NASL family | Windows |
NASL id | WINS_UDP_FLOOD.NASL |
description | We could crash the remote WINS server by sending it a lot of UDP packets containing random data. If you do not use WINS, then deactivate this server. An attacker may use this flaw to bring down your NT network. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10315 |
published | 1999-08-30 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10315 |
title | Microsoft Windows NT WINS Service Malformed Data DoS |
code |
|