Vulnerability Note VU#693099
Microsoft Windows 2000 vulnerable to DoS via malformed packets sent to port 445/tcp
The default configuration of Microsoft Windows 2000 does not properly handle malformed packets received on TCP port 445. As a result, Windows may cease to function normally upon receipt of malformed packets on this port.
Microsoft LAN Manager (LANMAN) is enabled by default on systems running Microsoft Windows 2000. LANMAN listens to TCP port 445 and allocates kernel resources to handle requests on this port.
When LANMAN receives malformed packets, the system allocates kernel memory to handling these packets. When memory use approaches 100%, Windows and other applications may begin to behave erratically or fail. Symptoms may include: chronically incomplete drawing of windows; on-screen error boxes indicating that the sound driver could not be loaded, when a system sound would normally be played; IIS failure to execute ASP pages; and error messages such as "You do not have permissions to..." when attempting routine tasks such as restarting the system.
The complete impact of this vulnerability is not yet known. Consumption of memory will make applications fail in various ways and disrupt services provided by the system.
Apply a patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||10 Aug 2002|
CVSS Metrics (Learn More)
Thanks to Peter Gründl for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: Unknown
- Date Public: 17 Apr 2002
- Date First Published: 16 Sep 2002
- Date Last Updated: 15 Apr 2003
- Severity Metric: 5.49
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.