Microsoft Windows RPC Elevation of Privilege Vulnerability
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
A remote code execution vulnerability exists in the way that Microsoft Windows handles specially crafted Remote Procedure Call (RPC) requests. The remote code execution can occur when the RPC Network Data Representation (NDR) Engine improperly frees memory. An authenticated attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
An authenticated attacker could exploit the vulnerability by making malformed RPC requests to an affected host. The update addresses this vulnerability by modifying the way that Microsoft Windows handles RPC messages.
Impact
- Elevation of Privilege
System / Technologies affected
- Windows Server 2008, 2008 R2, 2012, 2012 R2
- Windows Vista, 7, 8, 8.1, RT 8.1, 10
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/library/security/MS16-061
Vulnerability Identifier
Source
Related Link
Share with