Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
http://support.microsoft.com/support/kb/articles/Q195/7/33.asp | broken link patch vendor advisory |
http://www.iss.net/security_center/static/523.php | vdb entry broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017 | patch vendor advisory |