Denial of Service Attack Causes Windows NT Systems to RestartLast reviewed: February 13, 1998Article ID: Q180963 |
The information in this article applies to:
SYMPTOMSDuring the processing of a Server Message Block (SMB) logon request, memory corruption occurs causing one of the following errors:
Note: The STOP errors will vary from case to case.
CAUSEThe size of data to follow is contained in the SMB logon request. When the size specified in the request does not match the size actually present, the corruption occurs.
RESOLUTIONTo resolve this problem, obtain the following fix or wait for the next Windows NT 4.0 service pack. This fix should have the following time stamp:
01/07/98 07:59p 229,840 Srv.sys (Intel) 01/07/98 07:56p 466,384 Srv.sys (Alpha)This hotfix has been posted to the following Internet location:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/ hotfixes-postSP3/srv-fixNOTE: The above link is one path; it has been wrapped for readability.
STATUSMicrosoft has confirmed this to be a problem in Windows NT version 4.0. A supported fix is now available, but has not been fully regression tested and should be applied only to systems experiencing this specific problem. Unless you are severely impacted by this specific problem, Microsoft recommends that you wait for the next Service Pack that contains this fix. Contact Microsoft Technical Support for more information. Keywords : kbbug4.00 kbfix4.00 NTSrv ntstop Version : WinNT:4.0 Platform : winnt Issue type : kbbug Solution Type : kbfix |
================================================================================
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |