Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w379-57qr-347p

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle attackers to execute arbitrary code via a malformed response, aka "RPC Memory Corruption Vulnerability."

The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle attackers to execute arbitrary code via a malformed response, aka "RPC Memory Corruption Vulnerability."

EPSS

Процентиль: 95%
0.18556
Средний

Дефекты

CWE-94

Связанные уязвимости

nvd
больше 15 лет назад

The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle attackers to execute arbitrary code via a malformed response, aka "RPC Memory Corruption Vulnerability."

EPSS

Процентиль: 95%
0.18556
Средний

Дефекты

CWE-94