The information in this article applies to:
SYMPTOMSOn a computer running Windows NT, a denial of service condition exists if a malicious process is run locally or if an improperly written service is installed. If more than the maximum number (16 by default) of processes that require user input are started without receiving the corresponding input, the server may stop responding (hang). CAUSE
This vulnerability affects Client Server Runtime Subsystem (CSRSS), which is otherwise known as the Win32 subsystem. CSRSS provides Windows NT services to client processes running on the local computer. When a client process requests a Win32 service, CSRSS generates a worker thread to service the request. If all worker threads are occupied, the request is queued until a thread completes its work and becomes available. RESOLUTIONTo resolve this problem, obtain the latest service pack for Windows NT 4.0 or
the individual software update. For information on obtaining the
latest service pack, please go to:
-or- http://www.microsoft.com/support/supportnet/overview/overview.aspThis hotfix has been posted to the following Internet location as Csrssfxi.exe (x86) and Csrssfxa.exe (Alpha): ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP5/Csrss-fix/ STATUSMicrosoft has confirmed this to be a problem in the Microsoft products listed at the beginning of this article. This problem was first corrected in Windows NT 4.0 Service Pack 6. MORE INFORMATION
It is important to understand that CSRSS only services requests made by other processes on the same local computer, so the computers primarily at risk are those that allow users to log on interactively with assigned rights to run a program or remotely install a service. Specifically, servers would be the most likely targets of such an attack. http://www.microsoft.com/security/ Additional query words:
Keywords : kbenv kbprg ntsecurity kbbug4.00 NT4SP6Fix |
Last Reviewed: October 28, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |