Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1364: Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode ad

0
Low
VulnerabilityCVE-1999-1364cve-1999-1364denial of service
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:12:30 UTC

Technical Analysis

CVE-1999-1364 is a vulnerability identified in Microsoft Windows NT 4.0, an operating system released in the mid-1990s. The vulnerability allows a local user to cause a denial of service (DoS) condition by crashing the system. This is achieved by providing an illegal kernel mode address to the Windows API functions GetThreadContext or SetThreadContext. These functions are used to retrieve or set the context of a thread, which includes processor registers and other critical execution state information. By passing an invalid kernel mode address, the system's kernel attempts to access or modify memory it should not, leading to a system crash. The vulnerability requires local access, meaning an attacker must already have some level of access to the system to exploit it. There is no indication that remote exploitation is possible, nor that user interaction beyond local access is needed. The CVSS score is low (2.1), reflecting limited impact and exploitability. No patches are available, and there are no known exploits in the wild. Given the age of Windows NT 4.0, this vulnerability is largely of historical interest, but it highlights risks associated with legacy systems still in operation.

Potential Impact

For European organizations, the direct impact of CVE-1999-1364 is minimal in modern contexts because Windows NT 4.0 is an obsolete operating system no longer supported or widely used. However, organizations that maintain legacy systems for critical infrastructure, industrial control, or specialized applications may still run Windows NT 4.0. In such environments, this vulnerability could be exploited by an insider or attacker with local access to cause system crashes, leading to denial of service. This could disrupt business operations, especially if the affected system is a critical server or part of a control system. The impact is limited to availability, with no confidentiality or integrity compromise. Since exploitation requires local access, the threat is primarily from malicious insiders or attackers who have already breached perimeter defenses. The lack of patches means organizations must rely on compensating controls. Overall, the risk is low but non-negligible for legacy-dependent environments in Europe.

Mitigation Recommendations

Given the absence of patches, European organizations should focus on mitigating this vulnerability through operational and architectural controls. First, phase out Windows NT 4.0 systems wherever possible by migrating to supported, modern operating systems. For legacy systems that cannot be replaced, restrict local access strictly using strong physical security, network segmentation, and access control policies. Employ strict user account management to limit the number of users with local login privileges. Monitor system logs and behavior for unusual activity that could indicate attempts to exploit this vulnerability. Use virtualization or sandboxing to isolate legacy systems from critical networks. Additionally, implement robust backup and recovery procedures to minimize downtime in case of a crash. Finally, educate staff about the risks of legacy systems and the importance of maintaining strict access controls.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df66b

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 11:12:30 AM

Last updated: 2/7/2026, 12:28:34 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats