|
|||
Rule General Information |
---|
Release Date: | 2020-10-26 | |
Rule Name: | Microsoft Windows Server Service RPC Request Handling Buffer Overflow Vulnerability -2 (CVE-2008-4250) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:31874 MicrosoftSecurityBulletin:ms08-067 ExploitDB:6824 ExploitDB:7104 |
|
Solutions |
---|
Microsoft has released a patch MS08-067 to eliminate the vulnerability. The patch can be downloaded at: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 |