Used Windows 2000 NetBIOS Name Server Protocol Spoofing Vulnerability Patch for Windows? Share your experience and help other users.
Key Details of Windows 2000 NetBIOS Name Server Protocol Spoofing Vulnerability Patch
- Eliminate a security vulnerability in a protocol implemented in Microsoft Windows systems.
- Last updated on
- There have been 7 updates
- Virus scan status:
Clean (it’s extremely likely that this software program is clean)
Developer’s Description
If normal security practices have been followed, and port 137 UDP has been blocked at the firewall, external attacks would not be possible. A patch is available that changes the behavior of Windows systems in order to give administrators additional flexibility in managing their networks. The patch allows administrators to configure a machine to only accept a name conflict datagram in direct response to a name registration attempt, and to configure machines to reject all name release datagrams. This will reduce but not eliminate the threat of spoofing. Customers needing additional protection may wish to consider using IPSec in Windows 2000 to authenticate all sessions on ports 137-139.
Microsoft created this patch to eliminate this security vulnerability.
Used Windows 2000 NetBIOS Name Server Protocol Spoofing Vulnerability Patch for Windows? Share your experience and help other users.
Explore More
Hidden sentence
FreeOneStep Installer
Trial versionPasswordGuard
Trial versionCryptonight
Trial versionFolder Secure
Trial versionBackup Pro
Trial versionWindows XP RDP Protocol Security Vulnerability Patch
FreeWindows 98 Unchecked Buffer Help Security Vulnerability Patch
FreeWindows XP Unchecked Buffer in File Decompression Functions Vulnerability Patch
FreeWorkStation Lock
Trial versionSecurepoint Intrusion Detection
FreeWindows 2000 Unchecked Buffer Help Security Vulnerability Patch
Free