Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p2rr-v2c9-wmv9

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."

Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."

EPSS

Процентиль: 75%
0.00884
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 15 лет назад

Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."

EPSS

Процентиль: 75%
0.00884
Низкий

Дефекты

CWE-119