Vulnerability Name:

CVE-1999-1579 (CCN-7107)

Assigned:2000-12-14
Published:2000-12-14
Updated:2018-08-13
Summary:The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-1999-1579

Source: MSKB
Type: UNKNOWN
Q242366

Source: CCN
Type: US-CERT VU#3062
Cenroll ActiveX Control allows creation of arbitrary files.

Source: CERT-VN
Type: US Government Resource
VU#3062

Source: CCN
Type: OSVDB ID: 18545
Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS

Source: BID
Type: UNKNOWN
6827

Source: CCN
Type: BID-6827
Windows NT Xenroll Library Storage Consumption Vulnerability

Source: XF
Type: UNKNOWN
winnt-xenroll-dos(7107)

Source: XF
Type: UNKNOWN
winnt-xenroll-dos(7107)

Source: CCN
Type: Microsoft Knowledge Base Article 242366
Denial of Service When Using Xenroll to Create Files or Write to the Registry

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows nt 4.0
    microsoft windows nt 4.0