The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability."
2010-12-16T19:33:02.223
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.4 (MEDIUM)
AV:N/AC:H/Au:N/C:N/I:N/A:C
4.9
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2003_server | * | Yes |
Operating System | microsoft | windows_server_2003 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |