Security Incidents mailing list archives
Windows XP - Still has a Windows NT4 DoS hangover?
From: Bob Fryer <efryer () onaustralia com au>
Date: 28 Nov 2001 05:26:24 -0000
Mailer: SecurityFocus Whilst indepth analysis could not be done (unit was sent back to vendor to be rebuilt), it appears that Windows XP has a similar exploit as Windows NT4. See http://hypoclear.cjb.net/hypo_nt_dos.txt Windows XP Home was running happily for a few weeks and as of yesterday would not allow the machine to boot up complaining of a 'ISASS.EXE" error and then rebooting itself. Trying the repair options after booting off CDROM, resulted in being asked for the administrator password, of which none has been set, by either the user or the original vendor, but refused to allow blank (default) or any that were tried. The vendor confirmed that they do not set it at all. There was a short timeframe where personal firewall software or virus software was not available, so a suspicion arises that the user was attacked via the internet during that time. Anyone else had any involvement with this problem? Regards Bob Fryer ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Windows XP - Still has a Windows NT4 DoS hangover? Bob Fryer (Nov 28)
- <Possible follow-ups>
- RE: Windows XP - Still has a Windows NT4 DoS hangover? Adcock, Matt (Nov 28)