First published: Wed Dec 11 2013(Updated: )
Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3878 is considered critical as it allows local users to gain elevated privileges through a buffer overflow vulnerability.
To fix CVE-2013-3878, apply the relevant security update provided by Microsoft.
CVE-2013-3878 affects Microsoft Windows XP SP2 and SP3, as well as Windows Server 2003 SP2.
CVE-2013-3878 is a stack-based buffer overflow in the LRPC client that can be exploited by malicious LRPC servers.
Local users can exploit CVE-2013-3878 by operating a crafted LRPC server that sends specially crafted LPC port messages.