Microsoft Windows NetBIOS NULL Source Name Remote DoS

High Nessus Plugin ID 10392


The remote application is prone to denial of service attacks.


The remote host appears to be running Microsoft Windows 95/98

The version of Windows installed on the remote host is vulnerable to the 'winpopups' or 'rfparalyze' denial of service. A user can leverage this issue to crash the remote host.

Note that Nessus crashed the remote host to test this flaw.


No patch available. Filter incoming traffic to this port.

See Also

Plugin Details

Severity: High

ID: 10392

File Name: rfparalyze.nasl

Version: $Revision: 1.28 $

Type: remote

Agent: windows

Family: Windows

Published: 2000/05/03

Modified: 2014/05/26

Dependencies: 10150

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:H/RL:U/RC:ND

Vulnerability Information

Required KB Items: SMB/name, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2000/05/11

Reference Information

CVE: CVE-2000-0347

BID: 1163

OSVDB: 1308