The exploit, which has been added to the freely available Metasploit point-and-click attack tool, provides a roadmap for code execution on Windows 2000, Windows XP, and Windows Server 2003. A second exploit has been posted to Milw0rm.com, increasing the likelihood of in-the-wild malware attacks.
[ SEE: MS ships emergency patch for Windows worm hole ]
From the Microsoft advisory:
Several proof-of-concepts have also been publicly released.
Microsoft shipped an out-of-band update last week to plug the hole after discovering “limited, targeted attacks" against Windows users. The attacks included the use of reconnaissance Trojans hijacking sensitive system information.
The vulnerability is due to the Windows Server service not properly handling specially crafted RPC requests. The vulnerable Windows Server service provides RPC support, file and print support, and named pipe sharing over the network. It is also used to allow the sharing of your local resources (such as disks and printers) so that other users on the network can access them.