![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10414 |
Category: | Denial of Service |
Title: | WinLogon.exe DoS |
Summary: | NOSUMMARY |
Description: | Description: It seems that is was possible to remotely crash winlogon.exe by sending a malformed request to access the registry of the remote host. The scanned host should now have an error box window on it's primary display. As soon as the error box is validated (clicked) the host will reboot. Solution : apply hotfix Q264684 Risk factor : High See also : http://www.microsoft.com/technet/security/bulletin/ms00-040.mspx |
Cross-Ref: |
BugTraq ID: 1331 Common Vulnerability Exposure (CVE) ID: CVE-2000-0377 http://www.securityfocus.com/bid/1331 Microsoft Security Bulletin: MS00-040 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-040 Microsoft Knowledge Base article: Q264684 http://www.microsoft.com/technet/support/kb.asp?ID=264684 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1021 XForce ISS Database: nt-registry-request-dos |
Copyright | This script is Copyright (C) 2000 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |