New Search

Netlogon RPC Null dereference DOS Vulnerability

oval:org.mitre.oval:def:11963

The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold SP2 and R2 when the domain controller role is enabled allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet aka "Netlogon RPC Null dereference DOS Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2008
Class:
vulnerability
Reference(s):
  • CVE-2010-2742
Product(s):