C
crtombes@yahoo.se
Guest
I recently downloaded the KB933729 update for Windows XP home edition.
After installing this patch for the RPC vulnerability I have had
several services crash (one at a time) due to a file that is part of
the RPC update, rpcrt4.dll. The services crashing have been random.
Uninstalling the update makes everything work as normal but I figure
this patch is important to have installed and would appreciate
feedback for a solution.
I should add that I have reinstalled the patch twice with AV and other
active software disabled.
Below is the dump file debugged with rpcrt4.dll version information,
perhaps somone with more knowledge can understand more of this,
thanks.
******
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(9b8.b8c): Access violation - code c0000005 (first/second chance not
available)
eax=89abcdef ebx=001879a8 ecx=0125fe18 edx=7c90eb94 esi=0017d4a0
edi=00000000
eip=77ef65e1 esp=0125fe30 ebp=0125ff80 iopl=0 nv up ei ng nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000282
rpcrt4!CStdAsyncStubBuffer2_Release+0x2b:
77ef65e1 8b08 mov ecx,dword ptr [eax] ds:
0023:89abcdef=????????
0:002> !analyze -v
*******************************************************************************
*
*
* Exception
Analysis *
*
*
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export
symbols for SiteAdv.dll -
FAULTING_IP:
rpcrt4!CStdAsyncStubBuffer2_Release+2b
77ef65e1 8b08 mov ecx,dword ptr [eax]
EXCEPTION_RECORD: ffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 77ef65e1 (rpcrt4!CStdAsyncStubBuffer2_Release
+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 89abcdef
Attempt to read from address 89abcdef
DEFAULT_BUCKET_ID: BAD_PTR_DEREFERENCE
PROCESS_NAME: SiteAdv.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p "0x%08lx"
refererade till minnet p "0x%08lx". Det gick inte att utf ra en
minnes tg rd. F ljande fel returnerades: The memory could not be "%s".
READ_ADDRESS: 89abcdef
BUGCHECK_STR: ACCESS_VIOLATION
LAST_CONTROL_TRANSFER: from 77e76c9f to 77ef65e1
STACK_TEXT:
0125ff80 77e76c9f 0125ffa8 77e76ac1 0017d4a0 rpcrt4!
CStdAsyncStubBuffer2_Release+0x2b
0125ff88 77e76ac1 0017d4a0 00000000 00d0e92c rpcrt4!
RecvLotsaCallsWrapper+0xd
0125ffa8 77e76c87 001855c8 0125ffec 7c80b683 rpcrt4!
BaseCachedThreadRoutine+0x79
0125ffb4 7c80b683 00187ac0 00000000 00d0e92c rpcrt4!ThreadStartRoutine
+0x1a
0125ffec 00000000 77e76c6d 00187ac0 00000000 kernel32!BaseThreadStart
+0x37
STACK_COMMAND: ~2s; .ecxr ; kb
FAULTING_THREAD: 00000b8c
PRIMARY_PROBLEM_CLASS: BAD_PTR_DEREFERENCE
FOLLOWUP_IP:
rpcrt4!CStdAsyncStubBuffer2_Release+2b
77ef65e1 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: rpcrt4!CStdAsyncStubBuffer2_Release+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rpcrt4
IMAGE_NAME: rpcrt4.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 46923632
FAILURE_BUCKET_ID: ACCESS_VIOLATION_rpcrt4!
CStdAsyncStubBuffer2_Release+2b
BUCKET_ID: ACCESS_VIOLATION_rpcrt4!CStdAsyncStubBuffer2_Release+2b
Followup: MachineOwner
---------
0:002> lmvm rpcrt4
start end module name
77e70000 77f01000 rpcrt4 (pdb symbols) I:\symbols
\rpcrt4.pdb\436F11D9044249B8AB818CAD4D9079E72\rpcrt4.pdb
Loaded symbol image file: rpcrt4.dll
Mapped memory image file: I:\symbols\rpcrt4.dll
\4692363291000\rpcrt4.dll
Image path: I:\WINDOWS\system32\rpcrt4.dll
Image name: rpcrt4.dll
Timestamp: Mon Jul 09 15:20:50 2007 (46923632)
CheckSum: 0009B60A
ImageSize: 00091000
File version: 5.1.2600.3173
Product version: 5.1.2600.3173
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: rpcrt4.dll
OriginalFilename: rpcrt4.dll
ProductVersion: 5.1.2600.3173
FileVersion: 5.1.2600.3173 (xpsp_sp2_qfe.070709-0052)
FileDescription: Remote Procedure Call Runtime
LegalCopyright: © Microsoft Corporation. All rights reserved.
******
After installing this patch for the RPC vulnerability I have had
several services crash (one at a time) due to a file that is part of
the RPC update, rpcrt4.dll. The services crashing have been random.
Uninstalling the update makes everything work as normal but I figure
this patch is important to have installed and would appreciate
feedback for a solution.
I should add that I have reinstalled the patch twice with AV and other
active software disabled.
Below is the dump file debugged with rpcrt4.dll version information,
perhaps somone with more knowledge can understand more of this,
thanks.
******
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(9b8.b8c): Access violation - code c0000005 (first/second chance not
available)
eax=89abcdef ebx=001879a8 ecx=0125fe18 edx=7c90eb94 esi=0017d4a0
edi=00000000
eip=77ef65e1 esp=0125fe30 ebp=0125ff80 iopl=0 nv up ei ng nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000282
rpcrt4!CStdAsyncStubBuffer2_Release+0x2b:
77ef65e1 8b08 mov ecx,dword ptr [eax] ds:
0023:89abcdef=????????
0:002> !analyze -v
*******************************************************************************
*
*
* Exception
Analysis *
*
*
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export
symbols for SiteAdv.dll -
FAULTING_IP:
rpcrt4!CStdAsyncStubBuffer2_Release+2b
77ef65e1 8b08 mov ecx,dword ptr [eax]
EXCEPTION_RECORD: ffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 77ef65e1 (rpcrt4!CStdAsyncStubBuffer2_Release
+0x0000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 89abcdef
Attempt to read from address 89abcdef
DEFAULT_BUCKET_ID: BAD_PTR_DEREFERENCE
PROCESS_NAME: SiteAdv.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p "0x%08lx"
refererade till minnet p "0x%08lx". Det gick inte att utf ra en
minnes tg rd. F ljande fel returnerades: The memory could not be "%s".
READ_ADDRESS: 89abcdef
BUGCHECK_STR: ACCESS_VIOLATION
LAST_CONTROL_TRANSFER: from 77e76c9f to 77ef65e1
STACK_TEXT:
0125ff80 77e76c9f 0125ffa8 77e76ac1 0017d4a0 rpcrt4!
CStdAsyncStubBuffer2_Release+0x2b
0125ff88 77e76ac1 0017d4a0 00000000 00d0e92c rpcrt4!
RecvLotsaCallsWrapper+0xd
0125ffa8 77e76c87 001855c8 0125ffec 7c80b683 rpcrt4!
BaseCachedThreadRoutine+0x79
0125ffb4 7c80b683 00187ac0 00000000 00d0e92c rpcrt4!ThreadStartRoutine
+0x1a
0125ffec 00000000 77e76c6d 00187ac0 00000000 kernel32!BaseThreadStart
+0x37
STACK_COMMAND: ~2s; .ecxr ; kb
FAULTING_THREAD: 00000b8c
PRIMARY_PROBLEM_CLASS: BAD_PTR_DEREFERENCE
FOLLOWUP_IP:
rpcrt4!CStdAsyncStubBuffer2_Release+2b
77ef65e1 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: rpcrt4!CStdAsyncStubBuffer2_Release+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rpcrt4
IMAGE_NAME: rpcrt4.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 46923632
FAILURE_BUCKET_ID: ACCESS_VIOLATION_rpcrt4!
CStdAsyncStubBuffer2_Release+2b
BUCKET_ID: ACCESS_VIOLATION_rpcrt4!CStdAsyncStubBuffer2_Release+2b
Followup: MachineOwner
---------
0:002> lmvm rpcrt4
start end module name
77e70000 77f01000 rpcrt4 (pdb symbols) I:\symbols
\rpcrt4.pdb\436F11D9044249B8AB818CAD4D9079E72\rpcrt4.pdb
Loaded symbol image file: rpcrt4.dll
Mapped memory image file: I:\symbols\rpcrt4.dll
\4692363291000\rpcrt4.dll
Image path: I:\WINDOWS\system32\rpcrt4.dll
Image name: rpcrt4.dll
Timestamp: Mon Jul 09 15:20:50 2007 (46923632)
CheckSum: 0009B60A
ImageSize: 00091000
File version: 5.1.2600.3173
Product version: 5.1.2600.3173
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: rpcrt4.dll
OriginalFilename: rpcrt4.dll
ProductVersion: 5.1.2600.3173
FileVersion: 5.1.2600.3173 (xpsp_sp2_qfe.070709-0052)
FileDescription: Remote Procedure Call Runtime
LegalCopyright: © Microsoft Corporation. All rights reserved.
******