从网页截图中获取到的关于漏洞的关键信息可以简洁地概括如下: Summary Advisory: NULL sessions vulnerabilities using alternate named pipes CVE Identifier: CAN-2005-2150 Release Date: 2005/07/07 Affected Systems: Windows NT 4.0, Windows 2000 (prior to URP1 for Windows 2000 SP4) Affected Systems Windows NT 4.0 Windows 2000 (prior to URP1 for Windows 2000 SP4) History 2004/01/23: Vulnerability reported to vendor 2004/02/12: Vendor announces its intention to release fixes as part of the next Windows 2000 Service Pack 2004/09/09: A related vulnerability affecting Windows XP SP2 is published 2005/02/08: Release of MS05-007, fixing a specific instance of a similar vulnerability in Windows XP and Windows XP SP2 2005/02/28: Private versions of Windows 2000 fixes available for test 2005/03/30: Confirmation that tested fixes correct the vulnerability 2005/06/28: Release of URP1 for Windows 2000 SP4, which includes fixes for Windows 2000 Overview An anonymous user can enumerate Windows services or read event logs of a remote Windows NT 4.0 or Windows 2000 system. Workaround Both vulnerabilities are fixed in URP1 for Windows 2000 SP4. To protect against the eventlog vulnerability, set registry value to 1. Vulnerability Assessment Nessus plugins are available to discover vulnerable hosts. References MSRPC null sessions: exploitation and protection Windows network services internals