Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows :: win5766.htm

Win2000 RPC Service Port 135 DoS



21th Oct 2002 [SBWID-5766]
COMMAND

	RPC service port 135 remote DoS

SYSTEMS AFFECTED

	Windows 2000

PROBLEM

	Thanks to Dave Aitel [dave@immunitysec.com]  founder  of  Immunity,  Inc
	[http://immunitysec.com] findings :
	

	--snip--
	

	The vulnerability itself is within the DCE-RPC  stack  of  Windows  2000
	and related OS's. This vulnerability allows anyone who  can  connect  to
	port 135 TCP to disable the  RPC  service.  Disabling  the  RPC  service
	causes the machine to stop responding to  new  RPC  requests,  disabling
	almost all functionality.
	

	This is a Denial Of Service via a  null  pointer  dereference,  and  not
	exploitable to gain permissions  on  the  remote  machine.  A  proof  of
	concept is available at http://www.immunitysec.com/vulnerabilities/
	

	This proof of concept Linux executable is derived from SPIKE 2.7  source
	code. Simply running SPIKE 2.7's msrpcfuzz is also  known  to  replicate
	this problem.
	

	--snap--

SOLUTION

	?


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH