Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Unsupported Windows NT 4.0 Installation


Vulnerability Assessment Details

Unsupported Windows NT 4.0 Installation

Vulnerability Assessment Summary
Remote Host is running Windows NT 4.0

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of Microsoft Windows NT 4.0.

This operating system is no longer supported by Microsoft, therefore this system
is vulnerable to multiple remotely exploitable vulnerabilities which may permit an
attacker or a worm to take the complete control of the remote system
(MS05-027, MS05-043 ...).

Solution : Upgrade to Windows XP/2000/2003.
See also : http://www.microsoft.com/ntserver/ProductInfo/Availability/Retiring.asp
Note : Nessus disabled tests for unpatched/unsupported flaws against this system.
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

(8) DELL Perc 310 OHV52W Raid Cards W Cables
$159.0
(8) DELL Perc 310 OHV52W Raid Cards W Cables pictureATTO H6F0-GT External SAS 6GB/s 16-Port PCI-E RAID Card 4x SFF-8644 mini-SAS HD
$199.95
ATTO H6F0-GT External SAS 6GB/s 16-Port PCI-E RAID Card 4x SFF-8644 mini-SAS HD picturePromise STEX4650 128Mb SAS / SATA Raid 3.0Gbps PCI-Express Controller Card
$29.0
Promise STEX4650 128Mb SAS / SATA Raid 3.0Gbps PCI-Express Controller Card pictureMegaRAID SAS 9286CV-8e 3.0 x8 SATA / SAS RAID **NO BBU**
$29.0
MegaRAID SAS 9286CV-8e 3.0 x8 SATA / SAS RAID **NO BBU** picture


Discussions

No Discussions have been posted on this vulnerability.