Used Microsoft Windows 2000 Patch: RPC Server Service Stops Responding for Windows? Share your experience and help other users.
Key Details of Microsoft Windows 2000 Patch: RPC Server Service Stops Responding
- Windows 2000 Update
- Last updated on
- Virus scan status:
Clean (it’s extremely likely that this software program is clean)
Developer’s Description
In order to exploit this vulnerability, a malicious RPC client must send a malformed RPC packet to a Windows 2000 server. On receiving the malformed RPC packet, the server stops responding to client requests.
This is a Denial of Service vulnerability which primarily affects Windows 2000 servers that are directly exposed on the Internet. A server behind a firewall that blocks ports 135-139 and 445 are not affected by this vulnerability.
RPC services and the functioning of the server can be restored after an attack by restarting the affected computer.
For more information about this vulnerability, read Microsoft Security Bulletin MS00-066.
Used Microsoft Windows 2000 Patch: RPC Server Service Stops Responding for Windows? Share your experience and help other users.
Explore More
X-Files
FreePersonal File Share
Trial versionMicrosoft Data Classification Toolkit
Freeraclet.net
Trial versionMessage Multiplexer
FreeJSCAPE MFT Gateway
Trial versionMady MTA Service
Trial versionPOPBeamer for Windows 2003 / 2008 (64-bit)
Trial versionICFTP Client
FreeJSCAPE MFT Gateway (64-bit)
Trial versionWorkgroupMail
PaidyaSSL Embedded Web Server
Free