Microsoft Windows NT 4.0 - NT4ALL Denial of Service

Author: hypoclear
type: dos
platform: windows
port: 
date_added: 2001-08-03  
date_updated: 2012-09-10  
verified: 1  
codes: CVE-2001-1122;OSVDB-59513  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21047.txt  
source: https://www.securityfocus.com/bid/3144/info

It has been reported that it is possible to cause a denial of service on a Windows NT system using the 'NT4ALL' tool.

The DoS reportedly occurs after the system reboots while being set in 'special mode' using 'NT4ALL'.

In order to exploit NT4ALL, a local user must reportedly have write permissions to the C:\winnt\system32\ directory.

This is a non-default configuration.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21047.zip