Skip to main content

CVE-2000-0347: Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session

Medium
VulnerabilityCVE-2000-0347cve-2000-0347rcedenial of service
Published: Tue May 02 2000 (05/02/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:49:56 UTC

Technical Analysis

CVE-2000-0347 is a vulnerability affecting Microsoft Windows 95 and Windows 98 operating systems. The flaw arises from the way these systems handle NetBIOS session requests. Specifically, an attacker can send a NetBIOS session request packet containing a NULL source name to a target machine. Due to insufficient validation of the source name field, the target system processes this malformed packet in a way that causes a denial of service (DoS). This results in the affected system becoming unresponsive or crashing, disrupting normal operations. The vulnerability does not allow for remote code execution or data compromise, but it does impact system availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The CVSS v2 base score is 5.0, indicating a medium severity level. There is no patch available for this vulnerability, and no known exploits have been observed in the wild. This vulnerability is specific to legacy Windows 95 and Windows 98 systems, which are largely obsolete and unsupported in modern environments.

Potential Impact

For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of Windows 95 and Windows 98 in enterprise environments. However, any legacy systems still running these operating systems—potentially in industrial control systems, embedded devices, or legacy application environments—could be susceptible to remote denial of service attacks. Such disruptions could lead to temporary loss of availability of critical systems, impacting business continuity. Given the network-based nature of the attack and lack of authentication requirements, an attacker within the same network or with network access could trigger the DoS condition. While confidentiality and integrity are not affected, availability degradation could impact operational processes, especially in sectors relying on legacy infrastructure. The absence of patches means mitigation relies on network controls and system isolation. The risk is higher in organizations that have not modernized their IT infrastructure or have legacy systems connected to broader networks.

Mitigation Recommendations

Since no patch is available, European organizations should focus on compensating controls to mitigate this vulnerability. First, isolate any Windows 95 or Windows 98 systems from untrusted networks, including the internet, using network segmentation and firewalls to block NetBIOS traffic (typically TCP/UDP ports 137-139 and 445). Implement strict access control lists (ACLs) to restrict which hosts can communicate with legacy systems. Monitor network traffic for unusual NetBIOS session requests, especially those with anomalous or null source names, using intrusion detection/prevention systems (IDS/IPS). Where possible, replace or upgrade legacy Windows 95/98 systems with supported operating systems to eliminate exposure. For environments where legacy systems must remain operational, consider deploying virtualized or sandboxed environments to contain potential disruptions. Regularly review and update network architecture to minimize exposure of legacy systems. Finally, educate IT staff about the risks associated with legacy systems and the importance of network hygiene.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7dfa70

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:49:56 PM

Last updated: 8/15/2025, 1:15:30 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats