MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through its RPC
facility.

Description :

The RPC client implementation on the remote host has an unspecified
memory corruption vulnerability. A specially crafted RPC response to
a client-initiated RPC request can result in arbitrary code execution.

A malicious RPC server could exploit this to take complete control of
the host.

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS10-066

Solution :

Microsoft has released a set of patches for Windows XP and 2003.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 49224 ()

Bugtraq ID: 43119

CVE ID: CVE-2010-2567