WinCOM LPD Leaves Windows NT Vulnerable to DoS Attacks

WinCOM LPD V.1.00.90 can be forced to consume all memory resources by sending constant LPD options to its listening port.

Steve Manzuik

September 18, 2000

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported September 19, 2000 by Vigilante

VERSIONS AFFECTED

DESCRIPTIONA malicious attacker could cause all available memory on a Windows NT host to be consumed if that Windows NT host is running WinCOM LPD V1.00.90.

DEMONSTRATION

By sending a constant stream of LPD options to TCP port 515, which is the default port that WinCOM LPD listens on, an attacker can cause all available memory resources to be consumed.

VENDOR RESPONSE

According to Vigilante, the vendor was contacted and has committed to fixing this issue in their next release of WinCOM LPD.

CREDITDiscovered by Vigilante

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like