Home : Registry : Security : Forums : Software Contacts 
Security Guide for Windows

Security Guide for Windows

Part of the WinGuides Network
WinGuides Network and Software
Security information, resources and support to secure Windows systems and networks.
 
[Advanced Search]


Recommended Download: Tweak Manager

Already a member? Sign in  Not a member? Register 
Recommended Download: Registry Mechanic

Buffer Overrun In RPCSS Service New
Category: Home > Windows NT, 2000 & XP

Three critical security vulnerabilities exist in the Remote Procedure Call (RPC) service that could allow an attacker to take any action on the system by sending a malformed RPC message to a vulnerable system.

Issue
Remote Procedure Call (RPC) is a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly access services on another computer. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions.

There are three newly identified vulnerabilities in the part of RPCSS Service that deals with RPC messages for DCOM activation— two that could allow arbitrary code execution and one that could result in a denial of service. The flaws result from incorrect handling of malformed messages. These particular vulnerabilities affect the Distributed Component Object Model (DCOM) interface within the RPCSS Service. This interface handles DCOM object activation requests that are sent from one machine to another.

An attacker who successfully exploited these vulnerabilities could be able to run code with Local System privileges on an affected system, or could cause the RPCSS Service to fail. The attacker could then be able to take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges.

Affected Products

  • Microsoft Windows NT Workstation 4.0
  • Microsoft Windows NT Server® 4.0
  • Microsoft Windows NT Server 4.0, Terminal Server Edition
  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003

    Download
    Software patches are available from the following locations:

  • Further Details
    Source:
    Reference:
    Updated: September 10, 2003


  • Copyright © 2003 GuideWorks. All rights reserved. Privacy Policy:Legal Notices