sharedholder
09-11-2003, 10:14 PM
Buffer Overrun In RPCSS Service
Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
http://www.microsoft.com/technet/treeview/...in/MS03-039.asp (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-039.asp)
Summary
Who should read this bulletin: Users running Microsoft ® Windows ®
Impact of vulnerability: Three new vulnerabilities, the most serious of which could enable an attacker to run arbitrary code on a user’s system.
Maximum Severity Rating: Critical
Recommendation: System administrators should apply the security patch immediately
End User Bulletin:
An end user version of this bulletin is available at:
http://www.microsoft.com/security/security...ns/ms03-039.asp (http://www.microsoft.com/security/security_bulletins/ms03-039.asp).
Protect your PC:
Additional information on how you can help protect your PC is available at the following locations:
End Users can visit http://www.microsoft.com/protect
IT Professionals can visit http://www.microsoft.com/technet/security/...ps/pcprotec.asp (http://www.microsoft.com/technet/security/tips/pcprotec.asp)
Affected Software:
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Server® 4.0
Microsoft Windows NT Server 4.0, Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Not Affected Software:
Microsoft Windows Millennium Edition
Patch availability
Download locations for this patch
Windows NT Workstation 4.0
Windows NT Server 4.0
Windows NT Server 4.0, Terminal Server Edition
Windows 2000
Windows XP
Windows XP 64 bit Edition
Windows XP 64 bit Edition Version 2003
Windows Server 2003
Windows Server 2003 64 bit Edition
Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
http://www.microsoft.com/technet/treeview/...in/MS03-039.asp (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-039.asp)
Summary
Who should read this bulletin: Users running Microsoft ® Windows ®
Impact of vulnerability: Three new vulnerabilities, the most serious of which could enable an attacker to run arbitrary code on a user’s system.
Maximum Severity Rating: Critical
Recommendation: System administrators should apply the security patch immediately
End User Bulletin:
An end user version of this bulletin is available at:
http://www.microsoft.com/security/security...ns/ms03-039.asp (http://www.microsoft.com/security/security_bulletins/ms03-039.asp).
Protect your PC:
Additional information on how you can help protect your PC is available at the following locations:
End Users can visit http://www.microsoft.com/protect
IT Professionals can visit http://www.microsoft.com/technet/security/...ps/pcprotec.asp (http://www.microsoft.com/technet/security/tips/pcprotec.asp)
Affected Software:
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Server® 4.0
Microsoft Windows NT Server 4.0, Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Not Affected Software:
Microsoft Windows Millennium Edition
Patch availability
Download locations for this patch
Windows NT Workstation 4.0
Windows NT Server 4.0
Windows NT Server 4.0, Terminal Server Edition
Windows 2000
Windows XP
Windows XP 64 bit Edition
Windows XP 64 bit Edition Version 2003
Windows Server 2003
Windows Server 2003 64 bit Edition