{"vuid":"VU#417052","idnumber":"417052","name":"Microsoft RPCSS Service contains memory leak in handling of specially crafted messages","keywords":["Microsoft","RPCSS Service","memory leak","specially crafted messages","AD20040413A","Q828741","MS04-012"],"overview":"Microsoft RPCSS Service contains a memory management vulnerability that may permit a remote attacker to cause a denial-of-service situation.","clean_desc":"The Microsoft RPCSS Service is responsible for managing Remote Procedure Call (RPC) messages and is enabled by default on many versions of Microsoft Windows. When the service receives a request from the DCOM/RPC interface to allocate memory, the size of the memory to be allocated is user-specified. A failure to check the size of the requested allocation and to reclaim discarded memory may lead to a resource exhaustion and cause a denial of service condition. The following systems are affected: Windows XP\nWindows Server 2003\nWindows 2000 For more infomation please see Microsoft Security Bulletin MS04-012 and eEye Digital Security Advisory [AD20040413A].","impact":"A remote attacker can consume all available memory causing a denial-of-service condition.","resolution":"Apply a patch from the vendor Microsoft Security Bulletin MS04-012 contains patch information to resolve this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft and eEye Digital Security for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx","http://www.eeye.com/html/Research/Advisories/AD20040413A.html"],"cveids":["CVE-2004-0116"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-13T18:33:37Z","publicdate":"2004-04-13T00:00:00Z","datefirstpublished":"2004-04-14T14:52:05Z","dateupdated":"2004-04-14T14:52:16Z","revision":4,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.796875","cam_scorecurrentwidelyknown":"5.0625","cam_scorecurrentwidelyknownexploited":"10.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.796875,"vulnote":null}