The NTLM Security Support Provider service provides security to RPC programs that use transports other than named pipes.
The vulnerability is caused due to an error while processing RPC authentication requests. Specially crafted packets using the NTLMSSP authentication can cause the RPC service to fail in such a way that could cause vulnerable system to restart.
The attacker could exploit this vulnerability by creating specially crafted RPC message and sending it to vulnerable system over an affected TCP/UDP port. These crafted messages could then cause the RPCSS service to stop responding and cause the vulnerable system to stop responding.
The information provided herein is on "as is" basis, without warranty of any kind.