MS-RPC: Microsoft Distributed Transaction Server Denial of Service
This signature detects attempts to exploit known vulnerabilities in Microsoft Distributed Transaction Coordinator (MSDTC). Attackers can send a specially crafted network message to an affected system to create a denial-of-service condition and cause the MSDTC to stop responding. These vulnerabilities would not allow an attacker to execute code or to elevate their user rights.
Extended Description
Microsoft Windows Distributed Transaction Coordinator is prone to a remote heap buffer-overflow vulnerability. This issue is due to the failure of the software to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This BID is flagged with the 'Conflicting Details' credibility rating because of the discrepancy between the vendor and the discoverer as to the possibility of remote code execution. Microsoft states that this issue may be exploited only to disrupt the MSDTC service and any services that depend on MSDTC, but the discoverer of this issue states that it may be exploited for remote code execution. This vulnerability affects Windows NT and Windows 2000 by default, since the service comes enabled. The vulnerability affects Windows XP and Windows Server 2003 only if the service is manually enabled.
Affected Products
Microsoft windows_xp_media_center_edition
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
7.5
5.0