The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS03-039: Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
Time: 16:52 EST/21:52 GMT | News Source: ActiveWin.com | Posted By: Todd Richardson

There are three identified vulnerabilities in the part of RPCSS Service that deals with RPC messages for DCOM activation- two that could allow arbitrary code execution and one that could result in a denial of service. The flaws result from incorrect handling of malformed messages. These particular vulnerabilities affect the Distributed Component Object Model (DCOM) interface within the RPCSS Service. This interface handles DCOM object activation requests that are sent from one machine to another.

An attacker who successfully exploited these vulnerabilities could be able to run code with Local System privileges on an affected system, or could cause the RPCSS Service to fail. The attacker could then be able to take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges. To exploit these vulnerabilities, an attacker could create a program to send a malformed RPC message to a vulnerable system targeting the RPCSS Service.

Write Comment
Return to News

  Displaying 701 through 701 of 701
Prev | First
  The time now is 5:56:05 PM ET.
Any comment problems? E-mail us
#701 By 4240821 (82.115.4.230) at 11/24/2025 2:58:45 PM
https://lustful.su/activ4b1b5b4hge
https://sexonly.su/activ4dga3125f3
https://sluts.su/activ331ebdbab4
https://sluts.su/activd33fbe4hbc
https://smutty.su/activ5g5bf5g515
https://nsfw.su/activ4aedhbfe52
https://smutty.su/activ54f1abfa4g
https://lustful.su/activ2c4d4d3h4b
https://nsfw.su/activ2ceb5cfg4a
https://sluts.su/activ4g1ecaaeae

Write Comment
Return to News
  Displaying 701 through 701 of 701
Prev | First
  The time now is 5:56:05 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *