This update resolves the "Malformed RPC Packet" security vulnerability in Windows 2000 and is discussed in Microsoft Security Bulletin MS00-066. Download now to prevent a malicious user from launching a Denial of Service attack via the Remote Procedure Call (RPC) client. In order to exploit this vulnerability, a malicious RPC client must send a malformed RPC packet to a Windows 2000 server. On receiving the malformed RPC packet, the server stops responding to client requests. This is a Denial of Service vulnerability which primarily affects Windows 2000 servers that are directly exposed on the Internet. A server behind a firewall that blocks ports 135-139 and 445 are not affected by this vulnerability. RPC services and the functioning of the server can be restored after an attack by restarting the affected computer. For more information about this vulnerability, read Microsoft Security Bulletin MS00-066.
||Windows NT 4 SP 6Windows 2003 SP 1Windows XP AMD 64-bitWindows XP 64-bit SP 1Windows NT 4 SP 2Windows 2000 SP 1Windows 2003 64-bitWindows 2003 AMD 64-bitWindows XP 64-bit SP 2Windows NT 4 SP 3Windows 2000 SP 2Windows Server 2003 x64 R2Windows 2000Windows 2003 64-bit SP 1Windows Vista AMD 64-bitWindows XP Itanium 64-bitWindows NT 4 SP 4Windows 2000 SP 3Windows NT 4Windows XP 32-bitWindows XP SP 1Windows Server 2003 x86 R2Windows MEWindows 2003 Itanium 64-bitWindows NT 4 SP 5Windows 2000 SP 4Windows Vista 32-bitWindows XP 64-bitWindows NT 4 SP 1Windows Server 2008 x64Windows NT 3Windows Server 2008 x86Windows XPWindows Server 2008Windows 2003Windows Vista Itanium 64-bitWindows XP Itanium 64-bit SP 1Windows 2003 32-bitWindows XP Itanium 64-bit SP 2Windows XP SP 2Windows 95Windows 98Windows VistaWindows NTWindows 2003 Itanium 64-bit SP 1Windows XP Pro