Netlogon RPC Null dereference DOS VulnerabilityID: oval:org.mitre.oval:def:11963 | Date: (C)2010-06-08 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability."
Platform: |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |