search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft RPCSS Service contains memory leak in handling of specially crafted messages

Vulnerability Note VU#417052

Original Release Date: 2004-04-14 | Last Revised: 2004-04-14


Microsoft RPCSS Service contains a memory management vulnerability that may permit a remote attacker to cause a denial-of-service situation.


The Microsoft RPCSS Service is responsible for managing Remote Procedure Call (RPC) messages and is enabled by default on many versions of Microsoft Windows. When the service receives a request from the DCOM/RPC interface to allocate memory, the size of the memory to be allocated is user-specified. A failure to check the size of the requested allocation and to reclaim discarded memory may lead to a resource exhaustion and cause a denial of service condition. The following systems are affected:

    • Windows XP
    • Windows Server 2003
    • Windows 2000

For more infomation please see Microsoft Security Bulletin MS04-012 and eEye Digital Security Advisory [AD20040413A].


A remote attacker can consume all available memory causing a denial-of-service condition.


Apply a patch from the vendor

Microsoft Security Bulletin MS04-012 contains patch information to resolve this issue.

Vendor Information


Microsoft Corporation Affected

Updated:  April 14, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Microsoft Security Bulletin MS04-012 contains information regarding this issue.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Microsoft and eEye Digital Security for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2004-0116
Severity Metric: 3.80
Date Public: 2004-04-13
Date First Published: 2004-04-14
Date Last Updated: 2004-04-14 14:52 UTC
Document Revision: 4

Sponsored by CISA.