Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote attackers to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.
https://exchange.xforce.ibmcloud.com/vulnerabilities/21288
https://exchange.xforce.ibmcloud.com/vulnerabilities/21286
http://www.securityfocus.com/bid/14178
http://www.securityfocus.com/bid/14177
http://www.hsc.fr/ressources/presentations/null_sessions/
http://securitytracker.com/id?1014417