The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014 - |
07 Nov 2023, 01:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 1998-09-29 04:00
Updated : 2024-11-20 23:29
NVD link : CVE-1999-0969
Mitre link : CVE-1999-0969
CVE.ORG link : CVE-1999-0969
JSON object : View
Products Affected
microsoft
- windows_nt
CWE