{"vuid":"VU#581603","idnumber":"581603","name":"Microsoft Services for UNIX Network File System (NFS) server is vulnerable to denial of service via memory leak","keywords":["Microsoft Services for UNIX 2.0","SFU","DoS","denial of service","Network File System","NFS","MS01-039","Q301514","Q294380"],"overview":"The NFS server included in the Microsoft Services for Unix package contains a denial-of-service vulnerability that may cause the system to become unstable or crash.","clean_desc":"The  Network File System (NFS) server included in the Microsoft Services for Unix (SFU) package contains a memory leak that can lead to excessive resource consumption on affected systems. This vulnerability affects Microsoft Windows NT 4.0 and Windows 2000 systems that have the SFU package installed.","impact":"By sending repeated requests to an affected Microsoft NFS server, attackers can consume all available memory resources, resulting in a denial-of-service condition.","resolution":"Microsoft has released the following patches to address this vulnerability Windows NT 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31600 \nWindows 2000: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31592","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported to Microsoft by Peter Grundl.","author":"This document was written by Jeffrey P. Lanza and is based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-039.asp","http://www.securityfocus.com/bid/3089"],"cveids":["CVE-2001-0505"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-07-24T20:55:03Z","publicdate":"2001-07-24T00:00:00Z","datefirstpublished":"2001-07-24T22:13:10Z","dateupdated":"2001-09-04T19:43:40Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"14","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.725","cam_scorecurrentwidelyknown":"5.5125","cam_scorecurrentwidelyknownexploited":"7.0875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.725,"vulnote":null}