Microsoft KB Archive/162927

= Telnetting to Port 53 May Crash DNS Service =

Article ID: 162927

Article Last Modified on 11/1/2006

-

APPLIES TO


 * Microsoft Windows NT Server 4.0 Standard Edition

-



This article was previously published under Q162927





SYMPTOMS
A Windows NT 4.0 Domain Name Service (DNS) server produces the following event error 454:

DNS Server select Function failed. The data is the error.

Besides the event error, CPU usage is high, the DNS server is unstable, and it sometimes crashes.



CAUSE
The possible cause of this problem is when an unknown user telnets to the DNS server port 53. When this is done, and a few characters are typed, the above behavior is seen on the Windows NT 4.0 DNS server.



RESOLUTION
Obtain the following fix, or wait for the next Windows NT service pack.

This hotfix has been posted to the following Internet location:

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP2/dns-fix



MORE INFORMATION
For additional information, please see the following article in the Microsoft Knowledge Base:

Article-ID: 169461

TITLE: Access Violation in DNS.EXE Caused by Malicious Telnet Attack



STATUS
Microsoft has confirmed this to be a problem in Windows NT version 4.0. This problem was corrected in the latest Microsoft Windows NT 4.0 U.S. Service Pack. For information on obtaining the service pack, query on the following word in the Microsoft Knowledge Base (without the spaces):

S E R V P A C K

Additional query words: dns prodnt telnet denial of service

Keywords: KB162927

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.