COMMAND

    kernel

SYSTEMS AFFECTED

    WinNT with SP4 (S, WKS, TSE)

PROBLEM

    The following is based on MS Security Bulletin.  If an  executable
    file with a specially-malformed image header is executed, it  will
    cause a  system   failure. The  affected machine  will need  to be
    rebooted in order to place it back in service.  Any work that  was
    in progress when  the machine crashed  could be lost.   Frequently
    asked questions regarding this vulnerability can be found at

        http://www.microsoft.com/security/bulletins/MS99-023faq.asp

SOLUTION

    Microsoft has  released a  patch that  eliminates a  vulnerability
    that could allow denial  of service  attacks  against Microsoft(r)
    Windows NT(r) servers, workstations,  and terminal servers.   This
    patch already is  available as part  of Windows NT  Server Service
    Pack 5,  but is  being provided  as   a stand-alone  patch for the
    benefit of users who have entered Y2K lockdown on Service Pack  4.
    Patch is available at:

    - Windows NT Server and Workstation 4.0:
        ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/Hotfixes-PostSP4/Kernel-fix/
    - Windows NT Server 4.0, Terminal Server Edition:
        ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40tse/Hotfixes-PostSP4/Kernel-fix/