CVE-2000-0347: Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session
Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.
AI Analysis
Technical Summary
CVE-2000-0347 is a vulnerability affecting Microsoft Windows 95 and Windows 98 operating systems. The flaw arises from the way these systems handle NetBIOS session requests. Specifically, an attacker can send a NetBIOS session request packet containing a NULL source name to a target machine. Due to insufficient validation of the source name field, the target system processes this malformed packet in a way that causes a denial of service (DoS). This results in the affected system becoming unresponsive or crashing, disrupting normal operations. The vulnerability does not allow for remote code execution or data compromise, but it does impact system availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The CVSS v2 base score is 5.0, indicating a medium severity level. There is no patch available for this vulnerability, and no known exploits have been observed in the wild. This vulnerability is specific to legacy Windows 95 and Windows 98 systems, which are largely obsolete and unsupported in modern environments.
Potential Impact
For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of Windows 95 and Windows 98 in enterprise environments. However, any legacy systems still running these operating systems—potentially in industrial control systems, embedded devices, or legacy application environments—could be susceptible to remote denial of service attacks. Such disruptions could lead to temporary loss of availability of critical systems, impacting business continuity. Given the network-based nature of the attack and lack of authentication requirements, an attacker within the same network or with network access could trigger the DoS condition. While confidentiality and integrity are not affected, availability degradation could impact operational processes, especially in sectors relying on legacy infrastructure. The absence of patches means mitigation relies on network controls and system isolation. The risk is higher in organizations that have not modernized their IT infrastructure or have legacy systems connected to broader networks.
Mitigation Recommendations
Since no patch is available, European organizations should focus on compensating controls to mitigate this vulnerability. First, isolate any Windows 95 or Windows 98 systems from untrusted networks, including the internet, using network segmentation and firewalls to block NetBIOS traffic (typically TCP/UDP ports 137-139 and 445). Implement strict access control lists (ACLs) to restrict which hosts can communicate with legacy systems. Monitor network traffic for unusual NetBIOS session requests, especially those with anomalous or null source names, using intrusion detection/prevention systems (IDS/IPS). Where possible, replace or upgrade legacy Windows 95/98 systems with supported operating systems to eliminate exposure. For environments where legacy systems must remain operational, consider deploying virtualized or sandboxed environments to contain potential disruptions. Regularly review and update network architecture to minimize exposure of legacy systems. Finally, educate IT staff about the risks associated with legacy systems and the importance of network hygiene.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Czech Republic
CVE-2000-0347: Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session
Description
Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.
AI-Powered Analysis
Technical Analysis
CVE-2000-0347 is a vulnerability affecting Microsoft Windows 95 and Windows 98 operating systems. The flaw arises from the way these systems handle NetBIOS session requests. Specifically, an attacker can send a NetBIOS session request packet containing a NULL source name to a target machine. Due to insufficient validation of the source name field, the target system processes this malformed packet in a way that causes a denial of service (DoS). This results in the affected system becoming unresponsive or crashing, disrupting normal operations. The vulnerability does not allow for remote code execution or data compromise, but it does impact system availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The CVSS v2 base score is 5.0, indicating a medium severity level. There is no patch available for this vulnerability, and no known exploits have been observed in the wild. This vulnerability is specific to legacy Windows 95 and Windows 98 systems, which are largely obsolete and unsupported in modern environments.
Potential Impact
For European organizations, the direct impact of this vulnerability today is limited due to the obsolescence of Windows 95 and Windows 98 in enterprise environments. However, any legacy systems still running these operating systems—potentially in industrial control systems, embedded devices, or legacy application environments—could be susceptible to remote denial of service attacks. Such disruptions could lead to temporary loss of availability of critical systems, impacting business continuity. Given the network-based nature of the attack and lack of authentication requirements, an attacker within the same network or with network access could trigger the DoS condition. While confidentiality and integrity are not affected, availability degradation could impact operational processes, especially in sectors relying on legacy infrastructure. The absence of patches means mitigation relies on network controls and system isolation. The risk is higher in organizations that have not modernized their IT infrastructure or have legacy systems connected to broader networks.
Mitigation Recommendations
Since no patch is available, European organizations should focus on compensating controls to mitigate this vulnerability. First, isolate any Windows 95 or Windows 98 systems from untrusted networks, including the internet, using network segmentation and firewalls to block NetBIOS traffic (typically TCP/UDP ports 137-139 and 445). Implement strict access control lists (ACLs) to restrict which hosts can communicate with legacy systems. Monitor network traffic for unusual NetBIOS session requests, especially those with anomalous or null source names, using intrusion detection/prevention systems (IDS/IPS). Where possible, replace or upgrade legacy Windows 95/98 systems with supported operating systems to eliminate exposure. For environments where legacy systems must remain operational, consider deploying virtualized or sandboxed environments to contain potential disruptions. Regularly review and update network architecture to minimize exposure of legacy systems. Finally, educate IT staff about the risks associated with legacy systems and the importance of network hygiene.
Threat ID: 682ca32db6fd31d6ed7dfa70
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/19/2025, 7:49:56 PM
Last updated: 2/7/2026, 12:28:42 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.