[原文]The Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service (service hang) via malformed packet fragments, aka "Improper parameter size check leading to denial of service."
This vulnerability was first detailed in a Microsoft Security Bulletin.
Microsoft Services for Unix 3.0
A denial of service vulnerability has been reported for RPC applications built using Microsoft Services for Unix Interix SDK.
This vulnerability is the result of RPC clients transmitting data in variable sized fragments. When RPC servers receive malformed fragments, the buffer overflow condition is triggered resulting in the RPC server failing to respond.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.