Overview
A vulnerability exists in Microsoft's Remote Procedure Call (RPC) implementation. A remote attacker could exploit this vulnerability to cause a denial of service. An exploit for this vulnerability is publicly available.
Description
Microsoft has released MS03-039 to address a vulnerability in Microsoft's Remote Procedure Call (RPC) implementation. A denial-of-service vulnerability exists in this service that can be remotely exploited. This vulnerability is not the same as the vulnerability described in CA-2003-16 (MS03-026), however, the impact is similar. An exploit for this vulnerability is publicly available. We have confirmed with Microsoft that this vulnerability only affects Windows 2000 systems. |
Impact
A remote attacker could exploit this vulnerability to cause a denial of service. Although it has been reported that this vulnerability may be used to gain elevated privileges, according to Microsoft's testing, exploitation of this vulnerability can only cause a denial-of-service condition. |
Solution
Microsoft has released a patch for this vulnerability in MS03-039. |
Restrict Access You may wish to block access to from outside your network perimeter, specifically by blocking access to TCP and UDP ports 135, 139, and 445. This will limit your exposure to attacks. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This document was written by Damon Morda.
Other Information
CVE IDs: | CVE-2003-0605 |
CERT Advisory: | CA-2003-19 |
Severity Metric: | 27.00 |
Date Public: | 2003-07-22 |
Date First Published: | 2003-07-31 |
Date Last Updated: | 2003-09-10 21:17 UTC |
Document Revision: | 22 |