RULE(RULE ID:1905225)

Rule General Information
Release Date: 2020-10-26
Rule Name: Microsoft Windows Server Service RPC Request Handling Buffer Overflow Vulnerability -2 (CVE-2008-4250)
Severity:
CVE ID:
Rule Protection Details
Description: The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows
Reference: SecurityFocusBID:31874
MicrosoftSecurityBulletin:ms08-067
ExploitDB:6824
ExploitDB:7104
Solutions
Microsoft has released a patch MS08-067 to eliminate the vulnerability. The patch can be downloaded at:
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067