>> > There's LSASS vulnerability: LSASS crashes when a lot of garbage is
written into IPC$
>> > pipe. NT itself doesn't BSOD, but nobody can logon to the system.
>> > It was fixed in SP5.
>> Serious question time (in two rival advocacy groups! uh oh!):
>> How does it do that? Does the garbage get in the login
>> service's hands and cause it to lock up, or ...?
>Probably, smthg like that.
>When we ran *cop Scanner "LSASS denial of service" test LSASS was
crashing. There was
>post-SP3 hot fix for that, but it didn't make it into SP4 by mistake.
SP5 has it.
>Boris
I think Chad was referring to the CSRSS problem, both were very close
together. As I understood it, the crsss service would wait for an ack
from it's response and would stop responding, they changed its
prioritization to prevent occurance.
http://www.veryComputer.com/
Microsoft Security Bulletin (MS99-021)
Patch Available for "CSRSS Worker Thread Exhaustion" Vulnerability
Originally Posted: June 23, 1999
Summary
Microsoft has released a patch that eliminates a vulnerability in the
Microsoft? Windows NT? CSRSS process that could be used to create a
denial of service condition against a machine that allows interactive
logons.
Frequently asked questions regarding this vulnerability can be found at
http://www.veryComputer.com/
Issue
If all worker threads in CSRSS.EXE are occupied awaiting user input, no
other requests can be serviced, effectively causing the server to hang.
When user input is provided, processing returns to normal. The patch
eliminates the vulnerability by ensuring that the last CSRSS worker
thread services only requests that do not require user input.
The LSA problem was a different issue of the LSA service failing when a
malformed request was received, forceing a reboot.
http://www.veryComputer.com/
Microsoft Security Bulletin (MS99-020)
Patch Available for "Malformed LSA Request" Vulnerability
Originally Posted: June 23, 1999
Revised: Ju1y 20, 1999
Summary
Microsoft has released a patch that eliminates a vulnerability that
poses a denial of service threat to Microsoft? Windows NT? servers and
workstations. A malformed request to the Local Security Authority (LSA)
service will causes the service to stop responding, requiring the
computer to be restarted.
A fully supported patch is available to eliminate the vulnerability, and
Microsoft recommends that affected customers download and install it, if
appropriate.
But I think this is the one Chad was referring to. It fits your
description better