Windows NT RPC locator vulnerable |
---|
Risk Level: | Medium | Check or Attack Name: RPC DLL version |
---|---|---|
Platforms: | Windows NT | |
Description: | Prior to installation of the Windows NT 4.0 post-SP2 rpc-fix, an attacker can telnet to port 135 and cause the system to become extremely slow. As a result of this denial of service attack, the RPC locator process will use nearly 100% of the processor. |
|
Remedy: | Apply the latest Windows NT 4.0 Service Pack, or Windows NT 3.51 and 4.0 users can apply the appropriate patch. To apply the latest Windows NT 4.0 Service Pack, follow these steps:
Windows NT 4.0 Service Pack 2 (SP2) users must apply the post-SP2 rpc-fix available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP2/rpc-fix. —OR—Windows NT 3.51 Service Pack 5 (SP5) users must apply the post-SP5 rpc-fix available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT351/hotfixes-postSP5/rpc-fix. |
|
References: |
Know Your Risks |