The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_nt | Microsoft | 4.0 | 4.0 |
Windows_nt | Microsoft | 4.0 | 4.0 |
Windows_nt | Microsoft | 4.0 | 4.0 |
Windows_nt | Microsoft | 4.0 | 4.0 |