Denial of Service in Applications Using RPC over Named Pipes

Article translations Article translations
Article ID: 195733 - View products that this article applies to.
This article was previously published under Q195733
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

On This Page

SYMPTOMS

Your Windows NT computer's responsiveness appears sluggish, and network clients may report a gradual decrease in system performance because of a Windows NT system process consuming 100 percent of CPU time. In addition, system memory usage may continually increase (potentially indicating a memory leak of system resources) up to the limit of available memory. The computer may stop responding (hang).

CAUSE

This problem is caused by a malicious attack on the remote procedure call (RPC) components in Windows NT using named pipes transport. Specific instances of this denial of service attack may be targeted at either the Spoolss.exe file or Lsass.exe file. There are different variations of the attack and each may create multiple named pipe connections to a Windows NT system and send random data. The RPC service then attempts to send a response and close each connection. The RPC service then cycles into a 100 percent CPU usage loop closing the invalid connections.

RESOLUTION

Windows NT Server and Workstation, Windows NT Server, Enterprise Edition

To resolve this problem, obtain the latest service pack for Windows NT 4.0 or the individual software update. For information on obtaining the latest service pack, please go to:
  • Windows Service Pack Center -or-

  • 152734 how to obtain the latest windows nt 4.0 service pack
For information on obtaining the individual software update, contact Microsoft Product Support Services. For a complete list of Microsoft Product Support Services phone numbers and information on support costs, please go to the following address on the World Wide Web:
http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMS

Windows NT Server 4.0, Terminal Server Edition

To resolve this problem, obtain the latest service pack for Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
152734 How to Obtain the Latest Windows NT 4.0 Service Pack

STATUS

Windows NT Server and Workstation, Windows NT Server, Enterprise Edition

Microsoft has confirmed this problem could result in some degree of security vulnerability in Windows NT version 4.0. This problem was first corrected in Windows NT version 4.0 Service Pack 5.

Windows NT Server 4.0, Terminal Server Edition

Microsoft has confirmed this problem could result in some degree of security vulnerability in Windows NT version 4.0, Terminal Server Edition. Microsoft has confirmed that this is a problem in Windows NT Server 4.0, Terminal Server Edition. This problem was first corrected in Windows NT Server 4.0, Terminal Server Edition Service Pack 4.

MORE INFORMATION

Using Windows NT Performance Monitor, you observe that, over time, the computer's CPU usage increases to 100 percent and remains there.

Properties

Article ID: 195733 - Last Review: February 21, 2014 - Revision: 4.0
APPLIES TO
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Server 4.0 Standard Edition
  • Microsoft Windows NT Server 4.0 Enterprise Edition
  • Microsoft BackOffice Small Business Server 4.0
Keywords: 
kbnosurvey kbarchive kbHotfixServer kbqfe kbbug kbfix KB195733

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com