MS04-029: Vulnerability in RPC Runtime Library Could Allow Information Disclosure and Denial of Service (873350)

High Nessus Plugin ID 15467


It is possible to crash the remote web server or retrieve sensitive information.


The remote Windows operating system contains a bug in RPC Runtime Library.

RPC is a protocol used by Windows to provide an inter-process communication mechanism that allows a program running on one system to access services on another one.

A bug affecting the implementation of this protocol could allow an attacker to cause it to crash, thus resulting in a crash of the whole operating system, or to disclose random parts of the memory of the remote host.

An attacker could exploit this flaw to obtain sensitive information about the remote host, by forcing it to disclose portions of memory containing passwords, or to cause it to crash repeatedly, thus causing a denial of service for legitimate users.


Microsoft has released a patch for Windows NT.

See Also

Plugin Details

Severity: High

ID: 15467

File Name: smb_nt_ms04-029.nasl

Version: $Revision: 1.28 $

Type: local

Agent: windows

Published: 2004/10/13

Modified: 2017/07/14

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2004/10/12

Vulnerability Publication Date: 2004/10/12

Reference Information

CVE: CVE-2004-0569

BID: 11380

OSVDB: 10686

MSFT: MS04-029

MSKB: 873350