Skip to main content

CVE-1999-1364: Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode ad

Low
VulnerabilityCVE-1999-1364cve-1999-1364denial of service
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:12:30 UTC

Technical Analysis

CVE-1999-1364 is a vulnerability identified in Microsoft Windows NT 4.0, an operating system released in the mid-1990s. The vulnerability allows a local user to cause a denial of service (DoS) condition by crashing the system. This is achieved by providing an illegal kernel mode address to the Windows API functions GetThreadContext or SetThreadContext. These functions are used to retrieve or set the context of a thread, which includes processor registers and other critical execution state information. By passing an invalid kernel mode address, the system's kernel attempts to access or modify memory it should not, leading to a system crash. The vulnerability requires local access, meaning an attacker must already have some level of access to the system to exploit it. There is no indication that remote exploitation is possible, nor that user interaction beyond local access is needed. The CVSS score is low (2.1), reflecting limited impact and exploitability. No patches are available, and there are no known exploits in the wild. Given the age of Windows NT 4.0, this vulnerability is largely of historical interest, but it highlights risks associated with legacy systems still in operation.

Potential Impact

For European organizations, the direct impact of CVE-1999-1364 is minimal in modern contexts because Windows NT 4.0 is an obsolete operating system no longer supported or widely used. However, organizations that maintain legacy systems for critical infrastructure, industrial control, or specialized applications may still run Windows NT 4.0. In such environments, this vulnerability could be exploited by an insider or attacker with local access to cause system crashes, leading to denial of service. This could disrupt business operations, especially if the affected system is a critical server or part of a control system. The impact is limited to availability, with no confidentiality or integrity compromise. Since exploitation requires local access, the threat is primarily from malicious insiders or attackers who have already breached perimeter defenses. The lack of patches means organizations must rely on compensating controls. Overall, the risk is low but non-negligible for legacy-dependent environments in Europe.

Mitigation Recommendations

Given the absence of patches, European organizations should focus on mitigating this vulnerability through operational and architectural controls. First, phase out Windows NT 4.0 systems wherever possible by migrating to supported, modern operating systems. For legacy systems that cannot be replaced, restrict local access strictly using strong physical security, network segmentation, and access control policies. Employ strict user account management to limit the number of users with local login privileges. Monitor system logs and behavior for unusual activity that could indicate attempts to exploit this vulnerability. Use virtualization or sandboxing to isolate legacy systems from critical networks. Additionally, implement robust backup and recovery procedures to minimize downtime in case of a crash. Finally, educate staff about the risks of legacy systems and the importance of maintaining strict access controls.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df66b

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 11:12:30 AM

Last updated: 8/12/2025, 4:22:42 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats