Skip to main content

Microsoft Windows RPC Elevation of Privilege Vulnerability

Last Update Date: 12 May 2016 Release Date: 11 May 2016 4030 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS

A remote code execution vulnerability exists in the way that Microsoft Windows handles specially crafted Remote Procedure Call (RPC) requests. The remote code execution can occur when the RPC Network Data Representation (NDR) Engine improperly frees memory. An authenticated attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

 

An authenticated attacker could exploit the vulnerability by making malformed RPC requests to an affected host. The update addresses this vulnerability by modifying the way that Microsoft Windows handles RPC messages.


Impact

  • Elevation of Privilege

System / Technologies affected

  • Windows Server 2008, 2008 R2, 2012, 2012 R2
  • Windows Vista, 7, 8, 8.1, RT 8.1, 10

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link