Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.
References
Link | Resource |
---|---|
http://support.microsoft.com/support/kb/articles/q142/6/53.asp | Patch Vendor Advisory |
http://www.iss.net/security_center/static/7421.php | |
http://support.microsoft.com/support/kb/articles/q142/6/53.asp | Patch Vendor Advisory |
http://www.iss.net/security_center/static/7421.php |
Configurations
History
20 Nov 2024, 23:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.microsoft.com/support/kb/articles/q142/6/53.asp - Patch, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/7421.php - |
Information
Published : 1999-12-31 05:00
Updated : 2024-11-20 23:30
NVD link : CVE-1999-1364
Mitre link : CVE-1999-1364
CVE.ORG link : CVE-1999-1364
JSON object : View
Products Affected
microsoft
- windows_nt
CWE