-----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Brief July 16, 2003
Flaw in Microsoft Windows RPC Implementation Synopsis: Microsoft has published a security bulletin describing a buffer overflow vulnerability in the Windows RPC (Remote Procedure Call) interface. The RPC protocol is integral to the normal operation of many networking technologies within the Windows operating system. The buffer overflow affects the DCOM (Distributed Component Object Model) interface on port TCP/135. Impact: Attackers may exploit this vulnerability by sending a specially-crafted RPC packet to port TCP/135 on a vulnerable target. Successful exploitation of this vulnerability will result in complete control of the target system. Many security-conscious administrators know to block this service at the perimeter, but open networks and personal computers used by individuals may be vulnerable to attack. Affected Versions: Microsoft Windows NT 4.0 Microsoft Windows NT 4.0 Terminal Services Edition Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Note: All major releases and Service Pack levels of the platforms above are vulnerable. For the complete ISS X-Force Security Alert, please visit: http://xforce.iss.net/xforce/alerts/id/147 ______ About Internet Security Systems (ISS) Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a pioneer and world leader in software and services that protect critical online resources from an ever-changing spectrum of threats and misuse. Internet Security Systems is headquartered in Atlanta, GA, with additional operations throughout the Americas, Asia, Australia, Europe and the Middle East. Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this document. It is not to be edited or altered in any way without the express written consent of the Internet Security Systems X-Force. If you wish to reprint the whole or any part of this document in any other medium excluding electronic media, please email [EMAIL PROTECTED] for permission. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, as well as at http://www.iss.net/security_center/sensitive.php Please send suggestions, updates, and comments to: X-Force [EMAIL PROTECTED] of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBPxW5oDRfJiV99eG9AQHTewQAoLJlro8jOmgQZc+iVV3//CLay9mKB4ak FQ5AqSy/7PQ7RW9h6AUxf7f2J3/rTnq/0zhYY5uoo3qv9yrmZttTnXS4xMVGJNze 0IAk51f33xCLpn+26YFaKrJhrxHtjXxlS54DaEPs8omJ720oBSY0StCmSvrXLnPc rCO3Vm6XB6k= =RA50 -----END PGP SIGNATURE----- _______________________________________________ ISSForum mailing list [EMAIL PROTECTED] TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to https://atla-mm1.iss.net/mailman/listinfo
