Executive Summary
Informations | |||
---|---|---|---|
Name | MS03-010 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Flaw in RPC Endpoint Mapper Could Allow Denial of Service Attacks (331953) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:59 | |||
Oval ID: | oval:org.mitre.oval:def:59 | ||
Title: | Microsoft Windows RPC Denial of Service | ||
Description: | The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2002-1561 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : MS RPC Services null pointer reference DoS File : nvt/msrpc-spike27.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13414 | Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotRevoke little endian overflow attempt RuleID : 5332 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotRevoke little endian overflow attempt RuleID : 5331 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotRevoke overflow attempt RuleID : 5330 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotRevoke overflow attempt RuleID : 5329 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 irot IrotRevoke little endian overflow attempt RuleID : 5328 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotRevoke little endian overflow attempt RuleID : 5327 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotRevoke overflow attempt RuleID : 5326 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 irot IrotRevoke overflow attempt RuleID : 5325 - Revision : 5 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode little endian andx attempt RuleID : 3271 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode andx attempt RuleID : 3270 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning little endian andx attempt RuleID : 3269 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning andx attempt RuleID : 3268 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode little endian attempt RuleID : 3267 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode attempt RuleID : 3266 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning little endian attempt RuleID : 3265 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning attempt RuleID : 3264 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB IrotIsRunning unicode little endian andx attempt RuleID : 3263 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB IrotIsRunning unicode andx attempt RuleID : 3262 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning little endian overflow attempt RuleID : 3261 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning overflow attempt RuleID : 3260 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning little endian overflow attempt RuleID : 3259 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning overflow attempt RuleID : 3258 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotIsRunning little endian overflow attempt RuleID : 3257 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotIsRunning overflow attempt RuleID : 3256 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning/Revoke overflow attempt RuleID : 3239-community - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning/Revoke overflow attempt RuleID : 3239 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning/Revoke overflow attempt RuleID : 3238-community - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning/Revoke overflow attempt RuleID : 3238 - Revision : 15 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-03-26 | Name : It is possible to disable the remote RPC service. File : smb_nt_ms03-010.nasl - Type : ACT_GATHER_INFO |
2002-11-21 | Name : The remote Windows host is affected by a denial of service vulnerability. File : msrpc-spike27.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:44:50 |
|
2014-01-19 21:29:48 |
|