|
COMMAND RPC service port 135 remote DoS SYSTEMS AFFECTED Windows 2000 PROBLEM Thanks to Dave Aitel [dave@immunitysec.com] founder of Immunity, Inc [http://immunitysec.com] findings : --snip-- The vulnerability itself is within the DCE-RPC stack of Windows 2000 and related OS's. This vulnerability allows anyone who can connect to port 135 TCP to disable the RPC service. Disabling the RPC service causes the machine to stop responding to new RPC requests, disabling almost all functionality. This is a Denial Of Service via a null pointer dereference, and not exploitable to gain permissions on the remote machine. A proof of concept is available at http://www.immunitysec.com/vulnerabilities/ This proof of concept Linux executable is derived from SPIKE 2.7 source code. Simply running SPIKE 2.7's msrpcfuzz is also known to replicate this problem. --snap-- SOLUTION ?