WinCOM LPD Leaves Windows NT Vulnerable to DoS Attacks
WinCOM LPD V.1.00.90 can be forced to consume all memory resources by sending constant LPD options to its listening port.
Steve Manzuik
September 18, 2000
1 Min Read
Reported September 19, 2000 by Vigilante VERSIONS AFFECTED DESCRIPTIONA malicious attacker could cause all available memory on a Windows NT host to be consumed if that Windows NT host is running WinCOM LPD V1.00.90. DEMONSTRATION By sending a constant stream of LPD options to TCP port 515, which is the default port that WinCOM LPD listens on, an attacker can cause all available memory resources to be consumed. VENDOR RESPONSE According to Vigilante, the vendor was contacted and has committed to fixing this issue in their next release of WinCOM LPD. CREDITDiscovered by Vigilante |
About the Author
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
You May Also Like