Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-1561 | First vendor Publication | 2003-04-02 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1561 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:59 | |||
Oval ID: | oval:org.mitre.oval:def:59 | ||
Title: | Microsoft Windows RPC Denial of Service | ||
Description: | The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2002-1561 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : MS RPC Services null pointer reference DoS File : nvt/msrpc-spike27.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13414 | Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotRevoke little endian overflow attempt RuleID : 5332 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotRevoke little endian overflow attempt RuleID : 5331 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotRevoke overflow attempt RuleID : 5330 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotRevoke overflow attempt RuleID : 5329 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 irot IrotRevoke little endian overflow attempt RuleID : 5328 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotRevoke little endian overflow attempt RuleID : 5327 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotRevoke overflow attempt RuleID : 5326 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 irot IrotRevoke overflow attempt RuleID : 5325 - Revision : 5 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode little endian andx attempt RuleID : 3271 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode andx attempt RuleID : 3270 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning little endian andx attempt RuleID : 3269 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning andx attempt RuleID : 3268 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode little endian attempt RuleID : 3267 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning unicode attempt RuleID : 3266 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning little endian attempt RuleID : 3265 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB-DS IrotIsRunning attempt RuleID : 3264 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB IrotIsRunning unicode little endian andx attempt RuleID : 3263 - Revision : 6 - Type : NETBIOS |
2014-01-10 | SMB IrotIsRunning unicode andx attempt RuleID : 3262 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning little endian overflow attempt RuleID : 3261 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning overflow attempt RuleID : 3260 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning little endian overflow attempt RuleID : 3259 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning overflow attempt RuleID : 3258 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotIsRunning little endian overflow attempt RuleID : 3257 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 irot IrotIsRunning overflow attempt RuleID : 3256 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning/Revoke overflow attempt RuleID : 3239-community - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCADG-IP-UDP irot IrotIsRunning/Revoke overflow attempt RuleID : 3239 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning/Revoke overflow attempt RuleID : 3238-community - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP irot IrotIsRunning/Revoke overflow attempt RuleID : 3238 - Revision : 15 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-03-26 | Name : It is possible to disable the remote RPC service. File : smb_nt_ms03-010.nasl - Type : ACT_GATHER_INFO |
2002-11-21 | Name : The remote Windows host is affected by a denial of service vulnerability. File : msrpc-spike27.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:33 |
|
2024-11-28 12:05:17 |
|
2024-08-02 12:02:20 |
|
2024-08-02 01:01:22 |
|
2024-02-02 01:02:07 |
|
2024-02-01 12:01:23 |
|
2023-09-05 12:02:01 |
|
2023-09-05 01:01:14 |
|
2023-09-02 12:02:02 |
|
2023-09-02 01:01:15 |
|
2023-08-12 12:02:27 |
|
2023-08-12 01:01:15 |
|
2023-08-11 12:02:07 |
|
2023-08-11 01:01:16 |
|
2023-08-06 12:01:57 |
|
2023-08-06 01:01:16 |
|
2023-08-04 12:02:01 |
|
2023-08-04 01:01:15 |
|
2023-07-14 12:01:59 |
|
2023-07-14 01:01:16 |
|
2023-03-29 01:01:58 |
|
2023-03-28 12:01:21 |
|
2022-10-11 12:01:47 |
|
2022-10-11 01:01:08 |
|
2021-05-04 12:01:49 |
|
2021-04-22 01:01:57 |
|
2020-05-23 00:15:10 |
|
2019-05-09 12:01:14 |
|
2019-04-30 21:19:17 |
|
2018-10-13 00:22:26 |
|
2017-10-11 09:23:16 |
|
2016-08-31 12:00:43 |
|
2016-06-28 15:00:51 |
|
2016-04-26 12:19:54 |
|
2014-02-17 10:25:28 |
|
2014-01-19 21:21:50 |
|
2013-05-11 12:13:35 |
|