Short Name |
SCAN:CORE:MSRPC-WKSSVC |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SCAN |
Keywords |
Core Impact MSRPC WKSSVC Exploit |
Release Date |
2004/12/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the CORE Impact penetration testing tool using the MSRPC WKSSVC exploit against your network (this exploit is also detected by the signature attack object CRIT:MS-RPC:WKST-SVC-OF). Because CORE Impact can chain one infected computer to another, other machines in the network might already be compromised. CORE Impact can be used legitimately to perform a network security audit of your network. However, if a network security audit is not in progress, this signature can indicate that a malicious attacker is using the CORE Impact tool to compromise your network.
It has been reported that Microsoft Windows Workstation (WKSSVC.DLL) service is prone to a vulnerability that may allow a remote attacker to gain unauthorized access to a vulnerable host. The problem is in the handling of requests by the Workstation Service. The Workstation Service does not properly check bounds on remote data therefore making it possible to overwrite sensitive regions of system memory.