Short Name |
MS-RPC:OF:WKST-SVC-PIPE |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
MS-RPC |
Keywords |
smb workstation service overflow |
Release Date |
2004/01/28 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly is a suspiciously long argument for the NetrValidateName, NetrValidateName2, or NetrAddAlternateComputerName functions requested using a named-pipe transaction. An unauthenticated user can exploit this vulnerability on Windows 2000/XP servers to execute arbitrary code with system-level privileges.
It has been reported that Microsoft Windows Workstation (WKSSVC.DLL) service is prone to a vulnerability that may allow a remote attacker to gain unauthorized access to a vulnerable host. The problem is in the handling of requests by the Workstation Service. The Workstation Service does not properly check bounds on remote data therefore making it possible to overwrite sensitive regions of system memory.