Security Incidents mailing list archives

Windows XP - Still has a Windows NT4 DoS hangover?


From: Bob Fryer <efryer () onaustralia com au>
Date: 28 Nov 2001 05:26:24 -0000

Mailer: SecurityFocus

Whilst indepth analysis could not be done (unit was 
sent back to vendor to be rebuilt), it appears that 
Windows XP has a similar exploit as Windows NT4. 
See http://hypoclear.cjb.net/hypo_nt_dos.txt

Windows XP Home was running happily for a few 
weeks and as of yesterday would not allow the 
machine to boot up complaining of a 'ISASS.EXE" 
error and then rebooting itself.

Trying the repair options after booting off CDROM, 
resulted in being asked for the administrator 
password, of which none has been set, by either the 
user or the original vendor, but refused to allow blank 
(default) or any that were tried. The vendor confirmed 
that they do not set it at all.

There was a short timeframe where personal firewall 
software or virus software was not available, so a 
suspicion arises that the user was attacked via the 
internet during that time.

Anyone else had any involvement with this problem?

Regards
Bob Fryer

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: