Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Possible Compromise through a vulnerability in RPC


Vulnerability Assessment Details

Possible Compromise through a vulnerability in RPC

Vulnerability Assessment Summary
Logs in as 'e'/'asd#321'

Detailed Explanation for this Vulnerability Assessment

It was possible to log into the remote host with the login 'e' and
the password 'asd#321'.

A widely available exploit, using one of the vulnerabilities described
in the Microsoft Bulletin MS03-039 creates such an account. This probably
mean that the remote host has been compromised by the use of this exploit.

See also : http://www.microsoft.com/technet/security/bulletin/ms03-039.mspx
Solution : Re-install this host, as it has been compromised
Network Security Threat Level: Critical

Networks Security ID: 8459

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Lot of 3-Transcend 128 GB (TS128GMSA740) (SSD) Solid State Drive LOT OF 3
$99.99
Lot of 3-Transcend 128 GB (TS128GMSA740) (SSD) Solid State Drive LOT OF 3 pictureKingspec 1.8" ZIF 128GB MLC SSD Solid State Drive NEW
$171.19
Kingspec 1.8Dell Ultrabook Latitude E7240 i7 Processor, 8 GB RAM, 128 SSD Drive, Win 10 Pro
$40.0
Dell Ultrabook Latitude E7240 i7 Processor, 8 GB RAM, 128 SSD Drive, Win 10 Pro pictureSamsung 850 EVO 500GB SSD 2.5" MZ-75E500B/AM *BRAND NEW* hard drive
$0.01
Samsung 850 EVO 500GB SSD 2.5


Discussions

No Discussions have been posted on this vulnerability.