MS03-039 Buffer Overrun in RPCSS Flaw


Recommended Posts

MS03-039: A Buffer Overrun in RPCSS May Allow Code Execution

Q824146

Affected Software:

Microsoft Windows Server 2003, 64-Bit Enterprise Edition

Microsoft Windows Server 2003, 64-Bit Datacenter Edition

Microsoft Windows Server 2003, Enterprise Edition

Microsoft Windows Server 2003, Standard Edition

Microsoft Windows Server 2003, Web Edition

Microsoft Windows XP Professional

Microsoft Windows XP Home Edition

Microsoft Windows XP Media Center Edition

Microsoft Windows XP Tablet PC Edition

Microsoft Windows 2000 Advanced Server

Microsoft Windows 2000 Professional

Microsoft Windows 2000 Server

Microsoft Windows 2000 Datacenter Server

Microsoft Windows NT Server 4.0

Microsoft Windows NT Server 4.0 Terminal Server Edition

Microsoft Windows NT Workstation 4.0

Remote Procedure Call (RPC) is a protocol that is used by Windows. RPC provides an inter-process communication mechanism that allows a program that is running on one computer to seamlessly access services on another computer. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft-specific extensions.

There are three identified vulnerabilities in the part of the Windows RPC service (RPCSS) that deals with RPC messages for DCOM activation. Two of the vulnerabilities might allow arbitrary code to be run; one of the vulnerabilities might result in a denial of service. The flaws result from incorrect handling of malformed messages. These vulnerabilities affect the Distributed Component Object Model (DCOM) interface in RPCSS. This interface handles DCOM object activation requests that are sent by client computers to the server.

An attacker who successfully exploits these vulnerabilities might be able to run code with Local System rights on an affected computer, or could cause RPCSS to stop working. The attacker could then take any action on the computer, including installing programs, viewing, changing, or deleting data, or creating new accounts with full rights.

To exploit these vulnerabilities, an attacker could create an exploit program to send a malformed RPC message that targets RPCSS on a vulnerable server.

Download:

Windows 2003 32-bit

Windows 2003 64-bit

Windows XP 32-bit

Windows XP 64-bit 2002 Edition

Windows XP 64-bit 2003 Edition

Windows 2000 SP2, SP3, SP4

Windows NT 4.0 Workstation

Windows NT 4.0 Server

Windows NT 4.0 Terminal Server

Source:

MSKB824146

Link to comment
https://www.neowin.net/forum/topic/99886-ms03-039-buffer-overrun-in-rpcss-flaw/
Share on other sites

Microsoft Security Bulletin MS03-039 Print

Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)

Originally posted: September 10, 2003

Summary

Who should read this bulletin: Users running Microsoft ? Windows ?

Impact of vulnerability: Run code of attacker?s choice

Maximum Severity Rating: Critical

Recommendation: System administrators should apply the security patch immediately

End User Bulletin:

An end user version of this bulletin is available at:

http://www.microsoft.com/security/security...ns/ms03-039.asp.

Protect your PC:

Additional information on how you can help protect your PC is available at the following locations:

End Users can visit http://www.microsoft.com/protect

IT Professionals can visit http://www.microsoft.com/technet/security/...ps/pcprotec.asp

Affected Software:

Microsoft Windows NT Workstation 4.0

Microsoft Windows NT Server? 4.0

Microsoft Windows NT Server 4.0, Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Microsoft Windows Server 2003

Not Affected Software:

Microsoft Windows Millennium Edition

Patch availability

Download locations for this patch

Windows NT Workstation

Windows NT Server 4.0

Windows NT Server 4.0, Terminal Server Edition

Windows 2000

Windows XP

Windows XP 64 bit Edition

Windows XP 64 bit Edition Version 2003

Windows Server 2003

Windows Server 2003 64 bit Edition

http://www.microsoft.com/technet/treeview/...in/MS03-039.asp

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Yeah, I administrated a virtual desktop pool years ago during the Windows 7 days. There were a number of animations and effects that really killed performance. I setup a number of group policies to turn off all the things that make the desktop feel unresponsive. I didn't just blindly turn everything off, I turned things off that created a lot of motion, because that is where VDI struggles, but things that made the UI look pretty, but didn't use animation, I left turned on. Kind of a funny combination of settings to see Aero Glass and drop shadows enabled, but show window contents while dragging turned off, but hey, it is what worked.
    • It isn't fully a placebo. If a UI element uses a 0.25 second animation to appear, then removing the animation saves 0.25 seconds. That saved 0.25 seconds may not make any difference in how quickly you can click on something, but it will affect how quickly you can see it. Just depends on your goals.
    • I had to turn it off a long time ago on my work machine because virtual desktops were brutal when switching. Big thread about it on Microsoft forums. With animations off it's instant. Sucks as I had to uninstall Deskscapes as it requires animations but on my work machine productivity takes precedence.
    • Even though this tweak is basically just a placebo, I still find myself using it fairly often. There are better options out there, but the CrapFixer app https://github.com/builtbybel/CrapFixer is useful for testing and restoring the original state if needed
    • That’s such a heartwarming story — it really shows the strong sense of community Waffle House is known for. If anyone’s curious about what they offer or planning a visit, you can see full menu with updated prices and calories for 2025.
  • Recent Achievements

    • First Post
      Johnny Mrkvička earned a badge
      First Post
    • Week One Done
      viraltui earned a badge
      Week One Done
    • One Month Later
      serfegyed earned a badge
      One Month Later
    • Dedicated
      firey earned a badge
      Dedicated
    • Dedicated
      fettermanj earned a badge
      Dedicated
  • Popular Contributors

    1. 1
      +primortal
      656
    2. 2
      ATLien_0
      224
    3. 3
      Michael Scrip
      224
    4. 4
      Xenon
      146
    5. 5
      +FloatingFatMan
      143
  • Tell a friend

    Love Neowin? Tell a friend!