MS.Windows.RPC.DNS.Service.Buffer.Overflow
Description
This indicates an attempt to exploit a vulnerability in the Microsoft Windows Domain Name System (DNS) Server Service.
The vulnerability exists in the Remote Procedure Call (RPC) interface to the DNS service used for remote management. It is caused by a boundary-check error that can lead to a stack-based buffer overflow via a crafted RPC request.
Affected Products
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Server
Microsoft Windows Storage Server 2003
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Web Edition
Impact
Arbitrary code execution
Recommended Actions
Apply the patch supplied by the vendor:
http://www.microsoft.com/technet/security/Bulletin/MS07-029.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |