Vulnerability Note VU#326746
Microsoft Windows RPC service vulnerable to denial of service
A vulnerability exists in Microsoft's Remote Procedure Call (RPC) implementation. A remote attacker could exploit this vulnerability to cause a denial of service. An exploit for this vulnerability is publicly available.
Microsoft has released MS03-039 to address a vulnerability in Microsoft's Remote Procedure Call (RPC) implementation. A denial-of-service vulnerability exists in this service that can be remotely exploited. This vulnerability is not the same as the vulnerability described in CA-2003-16 (MS03-026), however, the impact is similar. An exploit for this vulnerability is publicly available. We have confirmed with Microsoft that this vulnerability only affects Windows 2000 systems.
A remote attacker could exploit this vulnerability to cause a denial of service. Although it has been reported that this vulnerability may be used to gain elevated privileges, according to Microsoft's testing, exploitation of this vulnerability can only cause a denial-of-service condition.
Microsoft has released a patch for this vulnerability in MS03-039.
You may wish to block access to from outside your network perimeter, specifically by blocking access to TCP and UDP ports 135, 139, and 445. This will limit your exposure to attacks. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||25 Jul 2003||10 Sep 2003|
CVSS Metrics (Learn More)
This document was written by Damon Morda.
- CVE IDs: CAN-2003-0605
- CERT Advisory: CA-2003-19
- Date Public: 22 Jul 2003
- Date First Published: 31 Jul 2003
- Date Last Updated: 10 Sep 2003
- Severity Metric: 27.00
- Document Revision: 22
If you have feedback, comments, or additional information about this vulnerability, please send us email.