[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Microsoft Windows Remote Procedure Call remote code execution vulnerability - MS10-066

ID: oval:org.secpod.oval:def:1452Date: (C)2011-07-15   (M)2022-04-14
Class: PATCHFamily: windows




The host is missing a critical security update according to Microsoft security bulletin, MS10-066. The update is required to fix code execution vulnerability. A flaw is present in the Remote Procedure Call (RPC) client implementation in Microsoft Windows, which fails to handle specially-crafted RPC response to a RPC request initiated by the client during allocation of memory. Successful exploitation could allow an attacker to execute arbitrary code on the system or cause the system to crash.

Platform:
Microsoft Windows XP
Microsoft Windows Server 2003
Reference:
MS10-066
CVE-2010-2567
CVE    1
CVE-2010-2567
CPE    6
cpe:/o:microsoft:windows_2003_server::sp2:itanium
cpe:/o:microsoft:windows_xp::sp3:x86
cpe:/o:microsoft:windows_xp:-:sp2:x64
cpe:/o:microsoft:windows_xp::sp2:x64
...
XCCDF    3
xccdf_com.secpod_benchmark_microsoft-windows-xp
xccdf_scaprepo.com_benchmark_microsoft-windows-server-2003
xccdf_com.secpod_benchmark_microsoft-windows-server-2003

© SecPod Technologies