Skip to main content

CVE-1999-0723: The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when

High
VulnerabilityCVE-1999-0723cve-1999-0723denial of service
Published: Wed Jun 23 1999 (06/23/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_2000

Description

The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input.

AI-Powered Analysis

AILast updated: 06/27/2025, 20:39:55 UTC

Technical Analysis

CVE-1999-0723 is a denial of service (DoS) vulnerability affecting the Windows NT Client Server Runtime Subsystem (CSRSS), specifically in Windows 2000 version 4.0. The CSRSS is a critical system process responsible for managing the user-mode side of the Win32 subsystem, including console windows, process/thread creation, and shutdown. This vulnerability arises when all worker threads within CSRSS become blocked, waiting for user input, which causes the subsystem to become unresponsive. Since CSRSS is essential for the operating system's stability and operation, its unavailability leads to a system-wide denial of service, effectively freezing or crashing the affected Windows 2000 system. The vulnerability has a CVSS score of 7.1 (high severity), with the vector indicating network attack complexity is medium, no authentication required, and the impact is solely on availability (no confidentiality or integrity impact). A patch addressing this vulnerability was released by Microsoft in 1999 (MS99-021). There are no known exploits in the wild documented for this vulnerability, but the risk remains for unpatched systems. Given the age of the affected product (Windows 2000), this vulnerability is primarily relevant to legacy systems still in operation.

Potential Impact

For European organizations, the impact of this vulnerability is primarily operational disruption due to denial of service on systems running Windows 2000. While Windows 2000 is an outdated operating system, some legacy industrial control systems, embedded devices, or specialized applications in sectors such as manufacturing, utilities, or government may still rely on it. An attacker exploiting this vulnerability could cause system crashes or freezes, leading to downtime, loss of productivity, and potential disruption of critical services. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely, but availability loss can have significant operational and financial consequences. The lack of known exploits reduces immediate risk, but organizations running unpatched legacy systems remain vulnerable. European organizations with strict uptime requirements or regulatory obligations around service availability should prioritize mitigation to avoid potential disruptions.

Mitigation Recommendations

1. Apply the official Microsoft patch MS99-021 immediately to all affected Windows 2000 systems to remediate the vulnerability. 2. Conduct an inventory of all systems to identify any running Windows 2000 or other legacy Windows NT-based operating systems and assess their exposure. 3. Where possible, upgrade legacy systems to supported, modern operating systems to eliminate exposure to this and other legacy vulnerabilities. 4. Implement network segmentation and access controls to restrict exposure of legacy systems to untrusted networks, minimizing attack surface. 5. Monitor system logs and performance metrics for signs of CSRSS thread exhaustion or unusual system hangs that could indicate attempted exploitation. 6. Develop and test incident response plans specific to legacy system failures to ensure rapid recovery in case of denial of service. 7. Consider virtual patching or compensating controls if patching or upgrading is not immediately feasible, such as limiting network access or applying host-based intrusion prevention rules targeting known attack vectors.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df091

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 8:39:55 PM

Last updated: 8/11/2025, 3:58:13 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats