Skip to main content

CVE-2000-0404: The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a

Medium
VulnerabilityCVE-2000-0404cve-2000-0404denial of service
Published: Thu May 25 2000 (05/25/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: terminal_server

Description

The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.

AI-Powered Analysis

AILast updated: 06/19/2025, 18:33:07 UTC

Technical Analysis

CVE-2000-0404 is a vulnerability in the CIFS (Common Internet File System) Computer Browser service, specifically affecting Microsoft Terminal Server version 4.0. The vulnerability arises because the Computer Browser service accepts ResetBrowser frames from remote attackers without sufficient validation. By sending a crafted ResetBrowser frame to the Master Browser, an attacker can disrupt the browser election process or force the Master Browser to reset, causing a denial of service (DoS) condition. This results in the temporary loss of network browsing functionality, where clients may be unable to locate or browse shared resources on the network. The vulnerability does not impact confidentiality or integrity but directly affects availability. The CVSS v2 score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. A patch addressing this vulnerability was released by Microsoft in May 2000 (MS00-036). There are no known exploits in the wild reported for this vulnerability, likely due to its age and the availability of patches. However, unpatched legacy systems running Terminal Server 4.0 remain vulnerable to remote DoS attacks that could disrupt network resource discovery and access.

Potential Impact

For European organizations, the primary impact of this vulnerability is the disruption of network browsing services on affected Windows Terminal Server 4.0 systems. This can lead to temporary denial of service conditions where users cannot browse shared network resources, potentially impacting productivity and access to critical files or applications hosted on the network. While the vulnerability does not allow data theft or system compromise, the loss of availability can affect business operations, especially in environments relying on legacy Windows Terminal Server infrastructure. Organizations with legacy systems in sectors such as manufacturing, government, or critical infrastructure may experience operational disruptions. Given the age of the vulnerability and the availability of patches, the impact is mostly limited to organizations that have not updated or migrated from outdated Microsoft Terminal Server versions.

Mitigation Recommendations

1. Apply the official Microsoft patch MS00-036 immediately to all affected Terminal Server 4.0 systems to remediate the vulnerability. 2. Where possible, upgrade legacy Terminal Server 4.0 systems to supported versions of Windows Server to benefit from improved security and support. 3. Restrict network access to Terminal Server systems by implementing network segmentation and firewall rules to limit exposure to untrusted networks, reducing the attack surface. 4. Monitor network traffic for unusual ResetBrowser frame packets or abnormal Master Browser resets as an indicator of attempted exploitation. 5. Disable the Computer Browser service on systems where it is not required to minimize the attack surface. 6. Implement network access controls and intrusion detection systems capable of detecting anomalous SMB/CIFS traffic patterns related to browser service disruptions.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7dfb75

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 6:33:07 PM

Last updated: 7/25/2025, 1:35:07 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats