CVE-1999-1234: LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL po
LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.
AI Analysis
Technical Summary
CVE-1999-1234 is a vulnerability affecting the Local Security Authority Subsystem Service (LSASS.EXE) in Microsoft Windows NT 4.0. The flaw allows remote attackers to cause a denial of service (DoS) condition by sending a NULL policy handle in calls to specific functions within the Security Account Manager (SAM) Remote Protocol: SamrOpenDomain, SamrEnumDomainUsers, and SamrQueryDomainInfo. These functions are responsible for managing domain security policies and enumerating domain user information. By passing a NULL handle, the LSASS process can crash or become unresponsive, resulting in a denial of service that disrupts authentication and security policy enforcement on the affected system. The vulnerability requires no authentication and can be triggered remotely over the network, making it accessible to unauthenticated attackers. However, this vulnerability does not impact confidentiality or integrity, only availability. The CVSS base score is 5.0 (medium severity), reflecting the ease of exploitation and the impact limited to availability. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability dates back to 1999 and affects only Windows NT 4.0, an operating system that is now obsolete and unsupported by Microsoft.
Potential Impact
For European organizations, the impact of this vulnerability is generally low in modern contexts due to the obsolescence of Windows NT 4.0. However, any legacy systems still running Windows NT 4.0, particularly in industrial control systems, critical infrastructure, or isolated legacy environments, could be vulnerable to remote denial of service attacks. A successful DoS attack against LSASS could disrupt authentication services, causing system outages, loss of access to domain resources, and potential operational downtime. This could affect business continuity and availability of critical services. Since the vulnerability does not allow for privilege escalation or data compromise, the confidentiality and integrity of data remain intact. Nonetheless, availability disruptions in authentication services can have cascading effects on network operations and user productivity. Organizations relying on legacy Windows NT 4.0 systems should be aware of this risk, especially if these systems are exposed to untrusted networks.
Mitigation Recommendations
Given that no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Isolate any Windows NT 4.0 systems from untrusted networks, including the internet, by placing them behind firewalls or network segmentation to prevent remote access to LSASS services. 2) Disable or restrict access to the SAM Remote Protocol services if possible, or block the specific RPC calls associated with SamrOpenDomain, SamrEnumDomainUsers, and SamrQueryDomainInfo at the network perimeter. 3) Monitor network traffic for unusual or malformed RPC requests targeting LSASS to detect potential exploitation attempts. 4) Plan and execute migration away from Windows NT 4.0 to supported operating systems to eliminate exposure to this and other legacy vulnerabilities. 5) Implement strict access controls and network-level authentication to limit exposure of legacy systems. These measures reduce the attack surface and mitigate the risk of remote denial of service attacks exploiting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-1999-1234: LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL po
Description
LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.
AI-Powered Analysis
Technical Analysis
CVE-1999-1234 is a vulnerability affecting the Local Security Authority Subsystem Service (LSASS.EXE) in Microsoft Windows NT 4.0. The flaw allows remote attackers to cause a denial of service (DoS) condition by sending a NULL policy handle in calls to specific functions within the Security Account Manager (SAM) Remote Protocol: SamrOpenDomain, SamrEnumDomainUsers, and SamrQueryDomainInfo. These functions are responsible for managing domain security policies and enumerating domain user information. By passing a NULL handle, the LSASS process can crash or become unresponsive, resulting in a denial of service that disrupts authentication and security policy enforcement on the affected system. The vulnerability requires no authentication and can be triggered remotely over the network, making it accessible to unauthenticated attackers. However, this vulnerability does not impact confidentiality or integrity, only availability. The CVSS base score is 5.0 (medium severity), reflecting the ease of exploitation and the impact limited to availability. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability dates back to 1999 and affects only Windows NT 4.0, an operating system that is now obsolete and unsupported by Microsoft.
Potential Impact
For European organizations, the impact of this vulnerability is generally low in modern contexts due to the obsolescence of Windows NT 4.0. However, any legacy systems still running Windows NT 4.0, particularly in industrial control systems, critical infrastructure, or isolated legacy environments, could be vulnerable to remote denial of service attacks. A successful DoS attack against LSASS could disrupt authentication services, causing system outages, loss of access to domain resources, and potential operational downtime. This could affect business continuity and availability of critical services. Since the vulnerability does not allow for privilege escalation or data compromise, the confidentiality and integrity of data remain intact. Nonetheless, availability disruptions in authentication services can have cascading effects on network operations and user productivity. Organizations relying on legacy Windows NT 4.0 systems should be aware of this risk, especially if these systems are exposed to untrusted networks.
Mitigation Recommendations
Given that no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Isolate any Windows NT 4.0 systems from untrusted networks, including the internet, by placing them behind firewalls or network segmentation to prevent remote access to LSASS services. 2) Disable or restrict access to the SAM Remote Protocol services if possible, or block the specific RPC calls associated with SamrOpenDomain, SamrEnumDomainUsers, and SamrQueryDomainInfo at the network perimeter. 3) Monitor network traffic for unusual or malformed RPC requests targeting LSASS to detect potential exploitation attempts. 4) Plan and execute migration away from Windows NT 4.0 to supported operating systems to eliminate exposure to this and other legacy vulnerabilities. 5) Implement strict access controls and network-level authentication to limit exposure of legacy systems. These measures reduce the attack surface and mitigate the risk of remote denial of service attacks exploiting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32cb6fd31d6ed7df343
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 2:26:48 PM
Last updated: 8/14/2025, 11:21:09 PM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.