Certain versions of Microsoft Windows are vulnerable to a buffer overflow in the DNS Server Service which could allow an unauthenticated local or remote attacker to execute arbitrary code under SYSTEM level privileges. The vulnerability may be exploited using different types of DCERPC transports, including ncalrpc (local), ncacn_ip_tcp (tcp/ip), and ncacn_np (named pipes).
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center