Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

MS-RPC:NETRLOGONGETDMNINF-NULL

Severity

Medium

Recommended

No

Recommended Action

Drop

Category

MS-RPC

Keywords

NetrLogonGetDomainInfo NULL Pointer

Release Date

2010/12/13

Update Number

1832

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

MS-RPC: NetrLogonGetDomainInfo NULL Pointer


This signature detects attempts to exploit a known vulnerability against Microsoft Windows MS-RPC NetrLogonGetDomainInfo. A successful attack can result in a denial-of-service condition on most architecture. On some ARM architecture this could result in code execution.

Extended Description

Microsoft Windows is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to restart the affected server, denying service to legitimate users. NOTE: A remote attacker must have administrator privileges on a machine in the same domain to leverage this issue.

Affected Products

  • Microsoft Windows Server 2003 SP2
  • Microsoft Windows Server 2003 Itanium SP2
  • Microsoft Windows Server 2003 x64 SP2
  • Microsoft Windows Server 2008 for 32-bit Systems SP2
  • Microsoft Windows Server 2008 for 32-bit Systems
  • Microsoft Windows Server 2008 for Itanium-based Systems R2
  • Microsoft Windows Server 2008 for Itanium-based Systems SP2
  • Microsoft Windows Server 2008 for x64-based Systems R2
  • Microsoft Windows Server 2008 for x64-based Systems SP2
  • Microsoft Windows Server 2008 for x64-based Systems
  • Microsoft Windows Server 2008 R2 Itanium

References

  • BugTraq: 45271
  • CVE: CVE-2010-2742

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out