-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Brief
July 16, 2003

Flaw in Microsoft Windows RPC Implementation

Synopsis:

Microsoft has published a security bulletin describing a buffer overflow
vulnerability in the Windows RPC (Remote Procedure Call) interface. The
RPC protocol is integral to the normal operation of many networking
technologies within the Windows operating system. The buffer overflow
affects the DCOM (Distributed Component Object Model) interface on port
TCP/135.

Impact:

Attackers may exploit this vulnerability by sending a specially-crafted
RPC packet to port TCP/135 on a vulnerable target. Successful exploitation
of this vulnerability will result in complete control of the target
system. Many security-conscious administrators know to block this service
at the perimeter, but open networks and personal computers used by
individuals may be vulnerable to attack.

Affected Versions:

Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003 

Note: All major releases and Service Pack levels of the platforms above
are vulnerable.

For the complete ISS X-Force Security Alert, please visit: 
http://xforce.iss.net/xforce/alerts/id/147
______ 


About Internet Security Systems (ISS) 
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a 
pioneer and world leader in software and services that protect critical 
online resources from an ever-changing spectrum of threats and misuse. 
Internet Security Systems is headquartered in Atlanta, GA, with 
additional operations throughout the Americas, Asia, Australia, Europe 
and the Middle East. 

Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved 
worldwide. 

Permission is hereby granted for the electronic redistribution of this 
document. It is not to be edited or altered in any way without the 
express written consent of the Internet Security Systems X-Force. If you 
wish to reprint the whole or any part of this document in any other 
medium excluding electronic media, please email [EMAIL PROTECTED] for 
permission. 

Disclaimer: The information within this paper may change without notice. 
Use of this information constitutes acceptance for use in an AS IS 
condition. There are NO warranties, implied or otherwise, with regard to 
this information or its use. Any use of this information is at the 
user's risk. In no event shall the author/distributor (Internet Security 
Systems X-Force) be held liable for any damages whatsoever arising out 
of or in connection with the use or spread of this information. 
X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, 
as well as at http://www.iss.net/security_center/sensitive.php 
Please send suggestions, updates, and comments to: X-Force 
[EMAIL PROTECTED] of Internet Security Systems, Inc. 

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBPxW5oDRfJiV99eG9AQHTewQAoLJlro8jOmgQZc+iVV3//CLay9mKB4ak
FQ5AqSy/7PQ7RW9h6AUxf7f2J3/rTnq/0zhYY5uoo3qv9yrmZttTnXS4xMVGJNze
0IAk51f33xCLpn+26YFaKrJhrxHtjXxlS54DaEPs8omJ720oBSY0StCmSvrXLnPc
rCO3Vm6XB6k=
=RA50
-----END PGP SIGNATURE-----
_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo

Reply via email to