RPC network data representation engine elevation of privilege vulnerability in Microsoft Remote Procedure Call (LRPC)ID: oval:org.secpod.oval:def:34310 | Date: (C)2016-05-11 (M)2024-03-06 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft Windows Vista, 7, 8.1, 10, Server 2008, 2008 R2, 2012 or 2012 R2 and is prone to a RPC network data representation engine elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle specially crafted Remote Procedure Call (RPC) requests. Successful exploitation could allow attackers to execute arbitrary code or take complete control of the affected system.
Platform: |
Microsoft Windows Vista |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |