Microsoft Windows Netlogon RPC Null dereference DOS Vulnerability
Last Update Date:
28 Jan 2011
Release Date:
15 Dec 2010
5741
Views
RISK: Medium Risk
A remote authenticated denial of service vulnerability exists in implementations of the Netlogon RPC Service on affected versions of Windows Server. An attacker who successfully exploited this vulnerability could cause affected versions of the Windows Server to restart.
Impact
- Denial of Service
System / Technologies affected
- Windows Server 2003
- Windows Server 2008
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Download locations for this patch
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 R2 for x64-based Systems
Vulnerability Identifier
Source
Related Link
Share with