Check Point Reference: | SBP-2009-29 |
Date Published: | 1 Mar 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | IPS Research Center |
Protection Provided by: | |
Who is Vulnerable? | Computers and Networks |
Vulnerability Description | DCE/RPC stands for "Distributed Computing Environment / Remote Procedure Calls". It is a Remote Procedure Call system that allows software to work across multiple computers, as if it were all working on the same computer. This system allows programmers to write distributed software without having to worry about the underlying network code. Microsoft RPC (Microsoft Remote Procedure Call) is a modified version of DCE/RPC. Additions include support for Unicode strings, implicit handles, inheritance of interfaces, and complex calculations in the variable-length string and structure paradigms already present in DCE/RPC. |
Vulnerability Details | IPS offers several MS-RPC and DCE-RPC protections: MS-RPC - General Settings Unauthenticated MS-RPC traffic may lead to malicious attacks on the target host. There are a variety of malicious attacks that can be performed using the DCE-RPC protocol, exploiting DCE-RPC services. By enabling the ‘Drop unauthenticated DCE-RPC traffic’ option, unauthenticated MS-RPC traffic is blocked. By enabling the ‘Block MS-RPC On All TCP High Ports’ option, all MS-RPC protections are enforced on TCP high ports, not only for the two specific TCP ports used by the CIFS protocol (139 and 445). MS-RPC Programs Lookup Non Standard MS-RPC Message Types Non Compliant MS-RPC |