Vulnerability Description
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 2000 | All versions |
| Microsoft | Windows Nt | 4.0 |
References
- http://www.nai.com/research/covert/advisories/044.asp
- http://www.securityfocus.com/bid/1514ExploitPatchVendor Advisory
- http://www.securityfocus.com/bid/1515
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-04
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5035
- http://www.nai.com/research/covert/advisories/044.asp
- http://www.securityfocus.com/bid/1514ExploitPatchVendor Advisory
- http://www.securityfocus.com/bid/1515
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-04
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5035
FAQ
What is CVE-2000-0673?
CVE-2000-0673 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the...
How severe is CVE-2000-0673?
CVE-2000-0673 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0673?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 2000, Microsoft Windows Nt.