Microsoft Windows Server service (SRVSVS) provides RPC support, file print support and named pipe sharing over the network. Buffer overflow in the Server Service in multiple versions of Microsoft Windows allows remote attackers to execute arbitrary code via a crafted RPC message containing malformed parameters. The vulnerability is being actively exploited.
The vulnerability can be triggered by supplying a crafted RPC request containing malformed parameters to some of the API functions offered by the Server service (port 139/TCP or 445/TCP). Successful exploitation could grant an attacker complete control of an affected system.
Supplying malformed parameters to some of the API functions offered of the Server service (SRVSVC) might allow remote attackers to take complete control of a vulnerable system.
By enabling the protection, SmartDefense will block MS-RPC Server service (SRVSVC) requests that contain malformed parameters.