CERT: Denial-of-Service Still Possible on W2K Systems with RPC Patch

The CERT Coordination Center put out a warning that Windows 2000 systems remain vulnerable to a denial-of-service attack even after applying the critical and high-profile RPC patch Microsoft issued in mid-July.

The Remote Procedure Call (RPC) patch, also known by its Microsoft Security Bulletin identifier, MS03-026, blocks a severe vulnerability that could allow an attacker to take control of users' machines over the Internet. Affected versions of Windows include Windows XP, Windows 2000, Windows NT 4.0 and Windows Server 2003.

That vulnerability seems ripe for a damaging worm, similar to Code Red or Nimda. Security firms have noted an increase in Internet scanning of the affected ports (135, 139 and 445) for vulnerabilities and several coder groups have published exploit code.

What the CERT/CC security incident team is now responding to is a less severe, and apparently separate, flaw in RPC that can allow a denial-of-service attack on Windows 2000.

"Systems running Windows 2000 may still be vulnerable to at least a denial-of-service attack … if their [Distributed Component Object Model Remote Procedure Call] service is available via the network," CERT/CC reports in an advisory updated Friday. "Exploit code for this vulnerability has been publicly released and also targets TCP port 135.

While Microsoft has confirmed that Windows 2000 is vulnerable to this second RPC flaw, no solution is available to fix the underlying problem. Microsoft and the CERT/CC both recommend that affected sites block UDP and TCP services on ports 135, 139 and 445.

The CERT advisory is available here:

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Malwarebytes Affirms Other APT Attack Methods Used Besides 'Solorigate'

    Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.

  • How To Fix the Hyper-V Read Only Disk Problem

    DOS might seem like a relic now, but sometimes it's the only way to fix a problem that Windows seems ill-equipped to deal with -- like this one.

  • Microsoft Warns IT Pros on Windows Netlogon Fix Coming Next Month

    Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.

  • Microsoft Nudging Skype for Business Users to Teams

    Microsoft on Thursday announced some perks and prods for Skype for Business unified communications users, with the aim of moving them to the Microsoft Teams collaboration service instead.

comments powered by Disqus