|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Denial of Service >> WinLogon.exe DoS Vulnerability Assessment Details
|
WinLogon.exe DoS |
||
crashes winlogon.exe Detailed Explanation for this Vulnerability Assessment It seems that is was possible to remotely crash winlogon.exe by sending a malformed request to access the registry of the remote host. The scanned host should now have an error box window on it's primary display. As soon as the error box is validated (clicked) the host will reboot. Solution : apply hotfix Q264684 Network Security Threat Level: High See also : http://www.microsoft.com/technet/security/bulletin/ms00-040.mspx Networks Security ID: 1331 Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison |
||
Cables, Connectors |
~DAILY DEALZ ~ Apple Mac Pro: Intel Xeon 32GB RAM 1TB SSD 1 Year Warranty
$284.99
Dell PowerEdge R640 Server 2x Gold 6150 2.70Ghz 36-Core 256GB 2x 960GB SSD H730P
$1737.25
Dell R730xd 12LFF 2.6Ghz 20-C 128GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails
$721.05
Dell R730xd 12LFF 2.6Ghz 28-C 256GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails
$947.05
Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5
$46.00
Intel Xeon E5-2690V2 3.00GHz 10-Core (SR1A5) Processor CPU READ DESCRIPTION
$12.00
Intel Xeon E5-2697 V4 2.30 GHz 18C 2011-3 2400MHz 45MB 145W SR2JV CPU Processor
$49.99
CM8066002031501 INTEL XEON E5-2680V4 2.40GHZ 35MB 14-CORE 120W PROCESSOR
$19.95
HP Z840 Workstation Intel Xeon E5-2637v4 3.5GHz 32GB RAM 1.5TB HDD W10P Nvidia
$269.99
HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram 512 SSD Quadro K420 Linux GA
$243.59
|
||
No Discussions have been posted on this vulnerability. |