MS.Windows.RPC.DNS.Service.Buffer.Overflow

description-logoDescription

This indicates an attempt to exploit a vulnerability in the Microsoft Windows Domain Name System (DNS) Server Service.
The vulnerability exists in the Remote Procedure Call (RPC) interface to the DNS service used for remote management. It is caused by a boundary-check error that can lead to a stack-based buffer overflow via a crafted RPC request.

affected-products-logoAffected Products

Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Server
Microsoft Windows Storage Server 2003
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Web Edition

Impact logoImpact

Arbitrary code execution

recomended-action-logoRecommended Actions

Apply the patch supplied by the vendor:
http://www.microsoft.com/technet/security/Bulletin/MS07-029.mspx

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)