This article was previously published under Q274372
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has released a security patch that resolves a vulnerability thatcan allow a malicious user to use a brute-force password-guessing attack against a Windows 2000-based computer, even if the domain administrator has set an account lockout policy. Such an attack can target only the account of a user who previously logged on to the target computer, and whose logon credentials are cached on the computer.
NOTE: This vulnerability affects only computer that are running Windows 2000 Service Pack 1 (SP1) and are members of non-Windows 2000-based domains.
Additional information about this issue is available from the followingMicrosoft Web site:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.The English version of this fix should have the following file attributes or later:
Date Time Version Size File name ------------------------------------------------------ 10/09/2000 04:22p 5.0.2195.2444 103,936 Msv1_0.dll
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 2.
For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the article number below to view the article in the Microsoft Knowledge Base:
249149 Installing Microsoft Windows 2000 and Windows 2000 Hotfixes