KnowledgeBase Archive

An Archive of Early Microsoft KnowledgeBase Articles

View on GitHub

Q195733: Denial of Service in Applications Using RPC over Named Pipes

Article: Q195733
Product(s): Microsoft Windows NT
Version(s): WinNT:4.0
Operating System(s): 
Keyword(s): kbWinNT400sp5fix _IK
Last Modified: 20-MAY-2002

-------------------------------------------------------------------------------
The information in this article applies to:

- Microsoft Windows NT Workstation version 4.0 
- Microsoft Windows NT Server version 4.0 
- Microsoft Windows NT Server, Enterprise Edition version 4.0 
- Microsoft Windows NT Server version 4.0, Terminal Server Edition 
- Microsoft BackOffice Small Business Server version 4.0 
-------------------------------------------------------------------------------

SYMPTOMS
========

Your Windows NT computer's responsiveness appears sluggish, and network clients
may report a gradual decrease in system performance because of a Windows NT
system process consuming 100 percent of CPU time. In addition, system memory
usage may continually increase (potentially indicating a memory leak of system
resources) up to the limit of available memory. The computer may stop responding
(hang).

CAUSE
=====

This problem is caused by a malicious attack on the remote procedure call (RPC)
components in Windows NT using named pipes transport. Specific instances of this
denial of service attack may be targeted at either the Spoolss.exe file or
Lsass.exe file. There are different variations of the attack and each may create
multiple named pipe connections to a Windows NT system and send random data. The
RPC service then attempts to send a response and close each connection. The RPC
service then cycles into a 100 percent CPU usage loop closing the invalid
connections.


RESOLUTION
==========

Windows NT Server and Workstation, 
Windows NT Server, Enterprise Edition
-------------------------------------------------------------------------

To resolve this problem, obtain the latest service pack for Windows NT 4.0 or the
individual software update. For information on obtaining the latest service
pack, please go to:

- http://www.microsoft.com/Windows/ServicePacks/

-or-

- Q152734 How to Obtain the Latest Windows NT 4.0 Service Pack

For information on obtaining the individual software update, contact Microsoft
Product Support Services. For a complete list of Microsoft Product Support
Services phone numbers and information on support costs, please go to the
following address on the World Wide Web:

  http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMS


Windows NT Server 4.0, Terminal Server Edition
----------------------------------------------

To resolve this problem, obtain the latest service pack for Windows NT Server
4.0, Terminal Server Edition. For additional information, please see the
following article in the Microsoft Knowledge Base:

  Q152734 How to Obtain the Latest Windows NT 4.0 Service Pack


STATUS
======

Windows NT Server and Workstation, 
Windows NT Server, Enterprise Edition
-------------------------------------------------------------------------

Microsoft has confirmed this problem could result in some degree of security
vulnerability in Windows NT version 4.0. This problem was first corrected in
Windows NT version 4.0 Service Pack 5.

Windows NT Server 4.0, Terminal Server Edition
----------------------------------------------

Microsoft has confirmed this problem could result in some degree of security
vulnerability in Windows NT version 4.0, Terminal Server Edition. Microsoft has
confirmed this to be a problem in Windows NT Server 4.0, Terminal Server
Edition. This problem was first corrected in Windows NT Server 4.0, Terminal
Server Edition Service Pack 4.

MORE INFORMATION
================

Using Windows NT Performance Monitor, you observe that, over time, the
computer's CPU usage increases to 100 percent and remains there.

Additional query words: denial of service nprpcfix
======================================================================
Keywords          : kbWinNT400sp5fix _IK 
Technology        : kbWinNTsearch kbWinNTWsearch kbWinNTW400 kbWinNTW400search kbWinNT400search kbWinNTSsearch kbWinNTSEntSearch kbWinNTSEnt400 kbWinNTS400search kbWinNTS400 kbNTTermServ400 kbNTTermServSearch kbAudDeveloper kbSBServSearch kbSBServ400
Version           : WinNT:4.0
Hardware          : ALPHA x86
Issue type        : kbbug
Solution Type     : kbfix

=============================================================================

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Copyright Microsoft Corporation 1986-2002.