[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RPC network data representation engine elevation of privilege vulnerability in Microsoft Remote Procedure Call (LRPC)

ID: oval:org.secpod.oval:def:34310Date: (C)2016-05-11   (M)2024-03-06
Class: VULNERABILITYFamily: windows




The host is installed with Microsoft Windows Vista, 7, 8.1, 10, Server 2008, 2008 R2, 2012 or 2012 R2 and is prone to a RPC network data representation engine elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle specially crafted Remote Procedure Call (RPC) requests. Successful exploitation could allow attackers to execute arbitrary code or take complete control of the affected system.

Platform:
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1
Microsoft Windows 10
Reference:
CVE-2016-0178
CVE    1
CVE-2016-0178
CPE    30
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_server_2008:::x64
cpe:/o:microsoft:windows_server_2008:::x86
cpe:/o:microsoft:windows_7::sp1:x64
...

© SecPod Technologies