Denial of Service Attack Causes Windows NT Systems to Restart

This article was previously published under Q180963
This article has been archived. It is offered "as is" and will no longer be updated.
During the processing of a Server Message Block (SMB) logon request, memorycorruption occurs causing one of the following errors:

STOP 0x0000000A
- OR -
STOP 0x00000050

The result is for the system to restart or stop responding (hang).

Note: The STOP errors will vary from case to case.
The size of data to follow is contained in the SMB logon request. When thesize specified in the request does not match the size actually present,the corruption occurs.
To resolve this problem, obtain the latest service pack for Windows NT 4.0 or Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
152734 How to Obtain the Latest Windows NT 4.0 Service Pack

For your convenience, the English version of this post-SP3 hotfix has beenposted to the following Internet location. However, Microsoft recommendsthat you install Windows NT 4.0 Service Pack 4 to correct this problem.

Microsoft has confirmed this problem could result in some degree ofsecurity vulnerability in Windows NT version 4.0. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.

Article ID: 180963 - Last Review: 10/07/2013 19:27:23 - Revision: 1.2

Microsoft Windows NT Server 4.0, Terminal Server Edition, Microsoft Windows NT Server 4.0 Standard Edition

  • kbnosurvey kbarchive kbbug kbfix KB180963