21th Oct 2002 [SBWID-5766]
COMMAND
RPC service port 135 remote DoS
SYSTEMS AFFECTED
Windows 2000
PROBLEM
Thanks to Dave Aitel [dave@immunitysec.com] founder of Immunity, Inc
[http://immunitysec.com] findings :
--snip--
The vulnerability itself is within the DCE-RPC stack of Windows 2000
and related OS's. This vulnerability allows anyone who can connect to
port 135 TCP to disable the RPC service. Disabling the RPC service
causes the machine to stop responding to new RPC requests, disabling
almost all functionality.
This is a Denial Of Service via a null pointer dereference, and not
exploitable to gain permissions on the remote machine. A proof of
concept is available at http://www.immunitysec.com/vulnerabilities/
This proof of concept Linux executable is derived from SPIKE 2.7 source
code. Simply running SPIKE 2.7's msrpcfuzz is also known to replicate
this problem.
--snap--
SOLUTION
?
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH