A vulnerability has been reported in Microsoft Plug and Play service which could be exploited by an attacker to gain complete control over target systems and enables him to install malware program, expose confidential information, or further network compromise.
The Plug and Play service is a Windows DCE-RPC service that is designed to handle device installation, configuration, and notification of new devices. A vulnerability exists in the Microsoft Plug and Play service due to an unchecked buffer which may be exploited to cause a stack-based overflow. It has been reported that the named-pipe needed to reach this service requires authentication on Windows XP and Windows Server 2003. On Windows 2000 additional named pipe aliases are present which expose this service to an attacker with NULL session access.
The information provided herein is on "as is" basis, without warranty of any kind.