Microsoft Security Advisory (911052): Memory Allocation Denial of Service Via RPC - 1


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (911052): Memory Allocation Denial of Service Via RPC - 1
# 1  
Old 12-24-2007
Microsoft Security Advisory (911052): Memory Allocation Denial of Service Via RPC - 1

Revision Note: Advisory updated to reference a CVE and to clarify that this issue is anonymously exploitable on Windows 2000 Service Pack 4. Advisory Summary:Microsoft is aware of public reports of proof-of-concept code that seeks to exploit a possible vulnerability in Windows 2000 SP4 and Windows XP SP1. This vulnerability could allow an attacker to levy a denial of service attack of limited duration. On Windows XP SP1, an attacker would need to have a valid logon on the system. For Windows XP SP1 users, an attacker must have valid logon credentials to try to exploit this vulnerability. The vulnerability could not be exploited remotely by anonymous users. However, the affected component is available remotely to users who have standard user accounts. In certain configurations, anonymous users could authenticate as the Guest account. Also, customers who have installed Windows XP Service Pack 2 are not affected by this vulnerability. Additionally, customers running Windows Server 2003 and Windows Server 2003 Service Pack 1 are not affected by this vulnerability.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
HYPER-V(4)						   BSD Kernel Interfaces Manual 						HYPER-V(4)

NAME
hv_netvsc -- Hyper-V Network Virtual Service Consumer SYNOPSIS
To compile this driver into the kernel, place the following lines in the system kernel configuration file: device hyperv DESCRIPTION
The hv_netvsc driver implements the virtual network device for FreeBSD guest partitions running on Hyper-V. FreeBSD guest partitions running on Hyper-V do not have direct access to network devices attached to the Hyper-V server. Although a FreeBSD guest can access network devices using Hyper-V's full emulation mode, the performance in this mode tends to be unsatisfactory. To counter the above issues, the hv_netvsc driver implements a network Virtual Service Consumer (VSC) that relays network requests from the guest partition to the network Virtual Service Provider (VSP) hosted in the root partition using the high performance data exchange infra- structure provided by hv_vmbus(4) driver. The VSP in the root partition then forwards the network related requests to the physical network card. SEE ALSO
hv_ata_pci_disengage(4), hv_storvsc(4), hv_utils(4), hv_vmbus(4) HISTORY
Support for hv_netvsc first appeared in FreeBSD 10.0. The driver was developed through a joint effort between Citrix Incorporated, Microsoft Corporation, and Network Appliance Incorporated. AUTHORS
FreeBSD support for hv_netvsc was first added by Microsoft BSD Integration Services Team <bsdic@microsoft.com>. BSD
September 10, 2013 BSD