Telnetting to Port 53 May Crash DNS Service

Article translations Article translations
Article ID: 162927 - View products that this article applies to.
This article was previously published under Q162927
Expand all | Collapse all

SYMPTOMS

A Windows NT 4.0 Domain Name Service (DNS) server produces the following event error 454:
DNS Server select() Function failed. The data is the error.
Besides the event error, CPU usage is high, the DNS server is unstable, and it sometimes crashes.

CAUSE

The possible cause of this problem is when an unknown user telnets to the DNS server port 53. When this is done, and a few characters are typed, the above behavior is seen on the Windows NT 4.0 DNS server.

RESOLUTION

Obtain the following fix, or wait for the next Windows NT service pack.

This hotfix has been posted to the following Internet location:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP2/dns-fix

MORE INFORMATION

For additional information, please see the following article in the Microsoft Knowledge Base:
Article-ID: 169461
TITLE: Access Violation in DNS.EXE Caused by Malicious Telnet Attack

STATUS

Microsoft has confirmed this to be a problem in Windows NT version 4.0. This problem was corrected in the latest Microsoft Windows NT 4.0 U.S. Service Pack. For information on obtaining the service pack, query on the following word in the Microsoft Knowledge Base (without the spaces):
S E R V P A C K

Properties

Article ID: 162927 - Last Review: November 1, 2006 - Revision: 1.1
APPLIES TO
  • Microsoft Windows NT Server 4.0 Standard Edition
Keywords: 
KB162927

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com