Vulnerability Name: | CCN-11273 | ||||||
Published: | 2003-02-04 | ||||||
Updated: | 2003-02-04 | ||||||
Summary: | A vulnerability in the RPC (Remote Procedure Call) service in Microsoft Windows 2000 could allow a local attacker to gain elevated privileges on the system. If a local attacker could cause a system service to crash by sending a malformed RPC request, the attacker could cause a named pipe to be orphaned. An attacker could then use this named pipe to gain elevated privileges on the system. | ||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
Vulnerability Consequences: | Gain Privileges | ||||||
References: | Source: CCN Type: Immunity, Inc. Security Paper, February, 4 2002 The Advantages of Block-Based Protocol Analysis for Security Testing Source: CCN Type: BID-6769 Microsoft Windows 2000 RPC Service Privilege Escalation Vulnerability Source: CCN Type: BID-8098 Microsoft Windows 2000 Terminal Services Named Pipe System Account Access Vulnerability Source: CCN Type: IBM Internet Security Systems X-Force Database Windows 2000 RPC TCP port 135 denial of service Source: XF Type: UNKNOWN win2k-rpc-gain-privileges(11273) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |