Microsoft Windows 2000 Patch: RPC Server Service Stops Responding

Windows 2000 Update
Download

Microsoft Windows 2000 Patch: RPC Server Service Stops Responding Ranking & Summary

Advertisement

  • Rating:
  • License:
  • Update
  • Operating Systems:
  • Windows XP Windows 2000 Windows 98
  • File Size:
  • 609k

Microsoft Windows 2000 Patch: RPC Server Service Stops Responding Tags


Microsoft Windows 2000 Patch: RPC Server Service Stops Responding Description

This update resolves the "Malformed RPC Packet" security vulnerability in Windows 2000 and is discussed in Microsoft Security Bulletin MS00-066. Download now to prevent a malicious user from launching a Denial of Service attack via the Remote Procedure Call (RPC) client. In order to exploit this vulnerability, a malicious RPC client must send a malformed RPC packet to a Windows 2000 server. On receiving the malformed RPC packet, the server stops responding to client requests. This is a Denial of Service vulnerability which primarily affects Windows 2000 servers that are directly exposed on the Internet. A server behind a firewall that blocks ports 135-139 and 445 are not affected by this vulnerability. RPC services and the functioning of the server can be restored after an attack by restarting the affected computer. For more information about this vulnerability, read Microsoft Security Bulletin MS00-066.


Microsoft Windows 2000 Patch: RPC Server Service Stops Responding Related Software