RPC Vulnerability Affects NT, W2K, XP

Microsoft on Wednesday warned users of an "important" new vulnerability involving the Remote Procedure Call (RPC) protocol in Windows NT, Windows 2000 and Windows XP that can allow a denial-of-service attack.

While a patch is available for Windows 2000 and Windows XP, Redmond cited architectural issues as preventing the company from creating a patch for Windows NT 4.0. The company provided workaround instructions, instead, for NT customers in the bulletin (

Microsoft's bulletin said servers on an intranet were the most likely to be vulnerable to the attack. The company went further to suggest that responsible network security practices should prevent the vulnerability from being open on Internet servers. "Best practices recommend blocking all TCP/IP ports that are not actually being used," the bulletin stated. "For this reason, most machines attached to the Internet should have port 135 blocked. RPC over TCP is not intended to be used in hostile environments such as the Internet."

The bulletin is Microsoft's 10th of 2003.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • The Case for In-Application Backups

    Application-integrated backup tools should never replace conventional backups, but they have their place.

  • Microsoft Uniting OneDrive and SharePoint Admin Portals Next Month

    Microsoft is converging its OneDrive and SharePoint Admin Center management portals, with a consolidated portal expected to arrive for Microsoft 365 subscribers "through February."

  • Phishing Tops Concerns in Microsoft Study of Remote Work

    Potential phishing attacks were a top concern of most IT security professionals when organizations switched to remote-work conditions early last year.

  • How To Configure Windows 10 for Intel Optane Memory

    Intel's Optane memory technology can significantly improve the performance of your Windows 10 system -- provided you enable it correctly. A single mistake can render the system unbootable. Here's how to do it the right way.

comments powered by Disqus