When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

MS03-039 Buffer Overrun In RPCSS Service

Remote Procedure Call (RPC) is a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly access services on another computer. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions.

There are three identified vulnerabilities in the part of RPCSS Service that deals with RPC messages for DCOM activation— two that could allow arbitrary code execution and one that could result in a denial of service. The flaws result from incorrect handling of malformed messages. These particular vulnerabilities affect the Distributed Component Object Model (DCOM) interface within the RPCSS Service. This interface handles DCOM object activation requests that are sent from one machine to another.

Download: Windows NT4.0 Workstation | Server | Terminal Server Edition

Download: Windows 2000

Download: Windows XP | Windows XP 64-bit Edition | Windows XP 64-bit Edition, Version 2003

Download: Windows Server 2003 | 64-bit Edition

Download: KB 824146 Scanner

View: Microsoft Knowledge Base article (824146)

News source: MS03-039: Buffer Overrun In RPCSS Service Could Allow Code Execution

Report a problem with article
Next Article

RIAA sued for amnesty offer

Previous Article

New Microsoft storage OS gets backers

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment