Windows XP - Still has a Windows NT4 DoS hangover?

From: Bob Fryer (efryerat_private)
Date: Fri Jan 11 2002 - 01:46:31 PST

  • Next message: Ryan Russell: "Re: new codered worm penetrates content-filtering"

    Mailer: SecurityFocus
    
    Whilst indepth analysis could not be done (unit was 
    sent back to vendor to be rebuilt), it appears that 
    Windows XP has a similar exploit as Windows NT4. 
    See http://hypoclear.cjb.net/hypo_nt_dos.txt
    
    Windows XP Home was running happily for a few 
    weeks and as of yesterday would not allow the 
    machine to boot up complaining of a 'ISASS.EXE" 
    error and then rebooting itself.
    
    Trying the repair options after booting off CDROM, 
    resulted in being asked for the administrator 
    password, of which none has been set, by either the 
    user or the original vendor, but refused to allow blank 
    (default) or any that were tried. The vendor confirmed 
    that they do not set it at all.
    
    There was a short timeframe where personal firewall 
    software or virus software was not available, so a 
    suspicion arises that the user was attacked via the 
    internet during that time.
    
    Anyone else had any involvement with this problem?
    
    Regards
    Bob Fryer
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Fri Jan 11 2002 - 08:22:30 PST