Microsoft Windows REGSVC Null Pointer Scanner
Checks if a Microsoft Windows 2000 system is vulnerable to a crash in regsvc caused by a null pointer dereference.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 sec
Scan only one
Domain, Ipv4
Toolbox
-
This check will crash the service if it is vulnerable and requires a guest account or higher to work. The vulnerability was discovered by Ron Bowes while working on smb-enum-sessions
and was reported to Microsoft (Case #MSRC8742). This check was previously part of smb-check-vulns.
![cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.](/_next/image?url=%2Fassets%2Fimages%2Fhome%2Fshield-256.png&w=640&q=75)
Try it yourself,
control security posture
control security posture