Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMB:EXPLOIT:REGISTRY-DOS

Severity

Critical

Recommended

No

Category

SMB

Keywords

smb remote registry dos MS00-040

Release Date

2004/01/28

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMB: Remote Registry Request DoS


The anomaly detects a suspiciously large registry key in the OpenKey function executed using a named-pipe transaction. Large key sizes in the OpenKey function can cause the winlogon.exe process in Window NT 4.0 to crash. The key size to trigger this attack can be configured in the sensor settings of the policy.

Extended Description

In special circumstances while handling requests to access the Remote Registry Server, Windows NT 4.0 can crash due to winlogon.exe's inability to process specially malformed remote registry requests. Rebooting the machine would be required in order to regain normal functionality. Only authenticated users on the network would be able to exploit this vulnerability. If Windows NT was configured to deny all remote registry requests, it would not be affected by this vulnerability under any conditions.

Affected Products

  • Microsoft Windows NT 4.0

References

  • BugTraq: 1331
  • CVE: CVE-2000-0377
  • URL: http://www.securityfocus.com/data/vulnerabilities/exploits/crash_winlogon.c
  • URL: http://www.microsoft.com/technet/security/bulletin/fq00-040.mspx

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out