MS04-029: Vulnerability in RPC Runtime Library Could Allow Information Disclosure and Denial of Service (873350)

high Nessus Plugin ID 15467

Synopsis

It is possible to crash the remote web server or retrieve sensitive information.

Description

The remote Windows operating system contains a bug in RPC Runtime Library.

RPC is a protocol used by Windows to provide an inter-process communication mechanism that allows a program running on one system to access services on another one.

A bug affecting the implementation of this protocol could allow an attacker to cause it to crash, thus resulting in a crash of the whole operating system, or to disclose random parts of the memory of the remote host.

An attacker could exploit this flaw to obtain sensitive information about the remote host, by forcing it to disclose portions of memory containing passwords, or to cause it to crash repeatedly, thus causing a denial of service for legitimate users.

Solution

Microsoft has released a patch for Windows NT.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2004/ms04-029

Plugin Details

Severity: High

ID: 15467

File Name: smb_nt_ms04-029.nasl

Version: 1.30

Type: local

Agent: windows

Published: 10/13/2004

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 10/12/2004

Vulnerability Publication Date: 10/12/2004

Reference Information

CVE: CVE-2004-0569

BID: 11380

MSFT: MS04-029

MSKB: 873350