Vulnerability Note VU#827267
Microsoft Server service RPC stack buffer overflow vulnerability
A stack buffer overflow vulnerability in the Microsoft Windows Server service may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges.
MS08-067 includes the following information about the Microsoft Server service:
The Server service provides RPC support, file print support and named pipe sharing over the network. The Server service allows the sharing of your local resources (such as disks and printers) so that other users on the network can access them. It also allows named pipe communication between applications running on other computers and your computer, which is used for RPC.
Exploit code for this vulnerability is publicly available, and the vulnerability is being currently exploited in the wild.
A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges on a vulnerable system.
Apply the updates referenced in Microsoft Security Bulletin MS08-067.
Block or Restrict Access
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||05 Nov 2008|
CVSS Metrics (Learn More)
Thanks to Microsoft for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CVE-2008-4250
- US-CERT Alert: TA08-297A
- Date Public: 23 Oct 2008
- Date First Published: 23 Oct 2008
- Date Last Updated: 02 Nov 2009
- Severity Metric: 88.20
- Document Revision: 30
If you have feedback, comments, or additional information about this vulnerability, please send us email.