RPC service terminated message

  • Thread starter Thread starter Phil
  • Start date Start date
P

Phil

I am running windows XP home and my computer wants to
shut down because the windows system comes up with an
error message saying "RPC Service terminated
unexpectedly."

Has this happened to anyone else and how can I fix it?
Thanks,
Phil
 
There are thousands of nasty computer viruses/worms looking for unprotected
computers. Your computer can be infected within a few milliseconds the moment
an internet connection is established if your computer is unsecured.

Apparently, your computer is now infected with the W32.Blaster.Worm or one of its variants.
This happened because you have not been using an internet connection firewall and have
apparently neglected to install the critical updates available at the Windows Update website.

If your computer is constantly attempting to shutdown
or reboot, quickly go to:

Start > Run and type: CMD , and hit enter.
This opens the Command Prompt window.

Then type: shutdown -a , and hit enter.

This should halt the rebooting problem.

Then immediately turn-on Windows XP's built-in Firewall:
http://www.microsoft.com/security/protect/

What You Should Know About the Blaster Worm and Its Variants
http://www.microsoft.com/security/incident/blast.asp

A tool is available to remove Blaster worm and Nachi worm infections from computers
that are running Windows 2000 or Windows XP
http://support.microsoft.com/?kbid=833330


--
Carey Frisch
Microsoft MVP
Windows XP - Shell/User

Be Smart! Protect your PC!
http://www.microsoft.com/security/protect/

---------------------------------------------------------------------------------


| I am running windows XP home and my computer wants to
| shut down because the windows system comes up with an
| error message saying "RPC Service terminated
| unexpectedly."
|
| Has this happened to anyone else and how can I fix it?
| Thanks,
| Phil
 
Carey:

That's a good reply except you need to add that the OP needs to install the following patch
for the RPC/RPCSS Buffer Overflow Vulnerability that is addressed by Microsoft Security
Bulletin MS03-39 http://support.microsoft.com/?kbid=824146

Dave



| There are thousands of nasty computer viruses/worms looking for unprotected
| computers. Your computer can be infected within a few milliseconds the moment
| an internet connection is established if your computer is unsecured.
|
| Apparently, your computer is now infected with the W32.Blaster.Worm or one of its
variants.
| This happened because you have not been using an internet connection firewall and have
| apparently neglected to install the critical updates available at the Windows Update
website.
|
| If your computer is constantly attempting to shutdown
| or reboot, quickly go to:
|
| Start > Run and type: CMD , and hit enter.
| This opens the Command Prompt window.
|
| Then type: shutdown -a , and hit enter.
|
| This should halt the rebooting problem.
|
| Then immediately turn-on Windows XP's built-in Firewall:
| http://www.microsoft.com/security/protect/
|
| What You Should Know About the Blaster Worm and Its Variants
| http://www.microsoft.com/security/incident/blast.asp
|
| A tool is available to remove Blaster worm and Nachi worm infections from computers
| that are running Windows 2000 or Windows XP
| http://support.microsoft.com/?kbid=833330
|
|
| --
| Carey Frisch
| Microsoft MVP
| Windows XP - Shell/User
|
| Be Smart! Protect your PC!
| http://www.microsoft.com/security/protect/
|
| ---------------------------------------------------------------------------------
|
| |
| | I am running windows XP home and my computer wants to
| | shut down because the windows system comes up with an
| | error message saying "RPC Service terminated
| | unexpectedly."
| |
| | Has this happened to anyone else and how can I fix it?
| | Thanks,
| | Phil
 
Welcome to the world of Blaster worm!
Most probably you have been infected with the Blaster worm that everyone
seems to have got last year. Run Windows Update and install the MS02-039
patch to block further infections and also to download and install the
Blaster removal tool. To stop your system from shutting down click Start >
Run and type:
shutdown -a
All the best.
N. P.
 
http://www.mvps.org/sramesh2k/Blaster_Defence.htm

--
Ramesh - Microsoft MVP
http://www.mvps.org/sramesh2k
-------------------------------------------
Virus attachment claims to contain software updates from Microsoft
http://www.mvps.org/sramesh2k/VirusAlert.htm

How to guard against CoolWebSearch spyware:
http://www.mvps.org/sramesh2k/Defend_CWS.htm
-------------------------------------------


I am running windows XP home and my computer wants to
shut down because the windows system comes up with an
error message saying "RPC Service terminated
unexpectedly."

Has this happened to anyone else and how can I fix it?
Thanks,
Phil
 
Real good advice.

All you did was provde a URL.

You go there and all you get are more URLs.

Can't you just place pertinent information in your reply ?

such as...
When you get the shutdown message...

Go to; Start --> Run
enter; shutdown -a

This will halt the shutdown and give you a chance to Download the McAfee worm removal tool,
Stinger: http://vil.nai.com/vil/stinger/ or the Microsoft Lovsan/Blaster and Nachi/Welchia
Removal Tool
http://www.microsoft.com/downloads/...8B-FE98-493F-AD76-BF673A38B4CF&displaylang=en
and install the following patch for the RPC/RPCSS Buffer Overflow Vulnerability that is
addressed by Microsoft Security Bulletin MS03-39 http://support.microsoft.com/?kbid=824146

Please read: http://www.microsoft.com/security/incident/blast.asp

You also need a FireWall. If you don't patch the PC and not use a FireWall then you will
just be re-infected.

I also suggest the installation of *ALL* MS Critical Updates ASAP.

~ ~ ~


Dave
 
Great point Dave, Glad to have someone tell a MVP what
they should be doing besides being a copy and paste URL
search function.



-----Original Message-----
Real good advice.

All you did was provde a URL.

You go there and all you get are more URLs.

Can't you just place pertinent information in your reply ?

such as...
When you get the shutdown message...

Go to; Start --> Run
enter; shutdown -a

This will halt the shutdown and give you a chance to
Download the McAfee worm removal tool,
Microsoft Lovsan/Blaster and Nachi/Welchia
Removal Tool
http://www.microsoft.com/downloads/details.aspx? FamilyId=E70A0D8B-FE98-493F-AD76-
BF673A38B4CF&displaylang=en
and install the following patch for the RPC/RPCSS Buffer Overflow Vulnerability that is
addressed by Microsoft Security Bulletin MS03-39 http://support.microsoft.com/?kbid=824146

Please read: http://www.microsoft.com/security/incident/blast.asp

You also need a FireWall. If you don't patch the PC and
not use a FireWall then you will
 
I've posted the information [about RPC] atleast >100 times and a simple google search "rpc mvp" would get excellent results.

This is what my standard reply is:
-------------------------------------
Your system is infected by RPC (W32.Blaster) Worm. This is causing the system to shutdown abnormally.

Cause: You have not enabled the firewall while browsing the internet and not patched the system with latest Microsoft WindowUpdate hotfixes.

A tool is available to remove Blaster worm and Nachi worm infections from computers that are running Windows 2000 or Windows XP:
http://support.microsoft.com/default.aspx?scid=833330

Learn more about Firewalls - Windows XP ICF:
http://www.mvps.org/sramesh2k/firewall.htm

Virus Alert About the Blaster Worm and Its Variants:
http://support.microsoft.com/default.aspx?kbid=826955

What You Should Know About the Blaster Worm
http://www.microsoft.com/security/incident/blast.asp
----------------------------

MS03-039 is teh latest RPC update and not MS03-026

--
Ramesh - Microsoft MVP
http://www.mvps.org/sramesh2k
-------------------------------------------
Virus attachment claims to contain software updates from Microsoft
http://www.mvps.org/sramesh2k/VirusAlert.htm

How to guard against CoolWebSearch spyware:
http://www.mvps.org/sramesh2k/Defend_CWS.htm
-------------------------------------------


Great point Dave, Glad to have someone tell a MVP what
they should be doing besides being a copy and paste URL
search function.



-----Original Message-----
Real good advice.

All you did was provde a URL.

You go there and all you get are more URLs.

Can't you just place pertinent information in your reply ?

such as...
When you get the shutdown message...

Go to; Start --> Run
enter; shutdown -a

This will halt the shutdown and give you a chance to
Download the McAfee worm removal tool,
Microsoft Lovsan/Blaster and Nachi/Welchia
Removal Tool
http://www.microsoft.com/downloads/details.aspx? FamilyId=E70A0D8B-FE98-493F-AD76-
BF673A38B4CF&displaylang=en
and install the following patch for the RPC/RPCSS Buffer Overflow Vulnerability that is
addressed by Microsoft Security Bulletin MS03-39 http://support.microsoft.com/?kbid=824146

Please read: http://www.microsoft.com/security/incident/blast.asp

You also need a FireWall. If you don't patch the PC and
not use a FireWall then you will
 
And remember Carey has covered everything [except MS03-039]. The link should explain how to prevent re-infection including the latest RPC security update.

--
Ramesh - Microsoft MVP
http://www.mvps.org/sramesh2k
-------------------------------------------
Prevent Spyware from being installed:
http://www.mvps.org/sramesh2k/Malware_Defence.htm

How to guard against CoolWebSearch spyware:
http://www.mvps.org/sramesh2k/Defend_CWS.htm
-------------------------------------------


Real good advice.

All you did was provde a URL.

You go there and all you get are more URLs.

Can't you just place pertinent information in your reply ?

such as...
When you get the shutdown message...

Go to; Start --> Run
enter; shutdown -a

This will halt the shutdown and give you a chance to Download the McAfee worm removal tool,
Stinger: http://vil.nai.com/vil/stinger/ or the Microsoft Lovsan/Blaster and Nachi/Welchia
Removal Tool
http://www.microsoft.com/downloads/...8B-FE98-493F-AD76-BF673A38B4CF&displaylang=en
and install the following patch for the RPC/RPCSS Buffer Overflow Vulnerability that is
addressed by Microsoft Security Bulletin MS03-39 http://support.microsoft.com/?kbid=824146

Please read: http://www.microsoft.com/security/incident/blast.asp

You also need a FireWall. If you don't patch the PC and not use a FireWall then you will
just be re-infected.

I also suggest the installation of *ALL* MS Critical Updates ASAP.

~ ~ ~


Dave
 
On Sat, 17 Jan 2004 22:48:21 +0530, "Ramesh [MVP]"
I've posted the information [about RPC] atleast >100 times and a simple
google search "rpc mvp" would get excellent results.

I sympathise, having done much the same, but users of "fit to ship" XP
that have left MS defaults (reboot on errors, reboot if RPC fails,
firewall disabled) in place may not stay alive long enough to chase up
URLs through a barrage of RPC attacks.

FWIW, here's my usual post on this one...

<paste>

It's been a while, so let me start with a recap of the history:

1) NT includes a Remote Procedure Call service that cannot be avoided
or turned off, because several internal processes require it. The
service exposes itself to all (TCP/IP only?) networks, including the
Internet. So any computer anywhere in the world can "have a go".

2) Since at least NT 4.0, if not earlier, the coding of this and
related DCOM critical services have included defects that allow
specially-constructed RPC requests to inject raw code into the system,
which Windows will run automatically shortly thereafter.

3) This defect persisted through all the NT 4.0 service packs, the
re-coding of NT for NT 5.0 and 5.1 (Win2000 and XP respectively) and
all the service packs thereof. However, the structure of the attack
packet changed between 5.0 and 5.1 - so that an attack crafted for 5.0
would cause 5.1 to simply crash, and vice versa.

4) In July 2003, MS documented the problem and issued a patch for NT
4.0, Win2000 and XP. As NT 3.xx is no longer supported, the lack of
coverage of this OS does not imply it is immune. However, Win9x
(95xx, 98xx and ME) *are* structurally immune, even if they have the
RPC service added to them - the code is completely different.

5) In August 2003, Lovesan.A spearheaded a series of malware that
attacked the NT RPC service. As well as several Lovesan variations,
there was also Welchia, a variant of the common SDBot trojan with
RPC-attacking capability added, and several others. Of these, only
those with alternate means of spread (such as SDBot.RPC.A) pose risks
to Win9x, though all Internet computers suffered the congestion caused
by Welchia's method of scouting for IP addresses to attack.

6) In Spetember 2003, MS revised the RPC patch, documenting three
additional exploitable defects in the previous "fix".

7) Subsequently, the author of SDBot.RPC.A and the author of a
Lovesan variant that had RAT (Remote Access Trojan) functionality
added to it, were apprehended and charged.


The most significant thing to know about RPC attacks is that you will
be attacked simply because you are connected to an infected network -
no software needs to be run, no action has to be taken by the user.
And the Internet is the mother of all infected networks :-)

Because the process of attempting an attack can crash the system,
traditional antivirus protection is irrelevant. Your NT PC could be
spontaneously restarting every few minutes without any malware
successfully gaining a foothold; the attempts themselves are escalated
to a significant DoS effect, due to particularly dumb MS settings.


To protect yourself against RPC attacks (instructions for XP):

1) Harden the PC against consequences of attack attempts

1.1) Stop the PC from restarting every time a system error occurs

Start, Settings, Control Panel, System icon, Advanced tab
Startup and Recovery section; click the Settings button
UNcheck the "Automatically restart" setting, OKOK

1.2) Stop the RPC service restarting the system when it dies

Start, Settings, Control Panel, Administrative Tools icon
Click into the Service icon
Find and click into Remote Procedure Call (RPC)
Recovery tab; all failures default to Restart the Computer
Change all of those to Restart the Service, OKOKOK

1.3) Turn on the built-in firewall for your Internet connection

This may block RPC attacks; I haven't relied on it alone, so I can't
say whether it alone is enough of a shield.

2) Fix the defective code

Microsoft does NOT send code fixes by email, particularly unsolicited
email (they do send alterts by email if you subscribe to that service,
but these always link to thier site rather than attach files).

So you need to go to MS's web site, find the RPC defect patch that is
relevant to your version of NT, download it, install it, and restart
the PC when prompted so that it can go into effect.

All this while several thousand infected PCs are squirting tiny RPC
attack packets directly into your system, with immediate effect - so
good luck! Hence step (1). Beg a Win9x user to download it for you
if your PC keeps crashing; it fits on one diskette.

3) Detect and clean up Lovesan and other malware

If you are using NTFS, you are forced to rely on informal tools to do
this, i.e. antivirus scanners that try to clean the system while
standing waist-deep in infected code. Several free utilities abound
that will scan specifically for particular malware, and NAI has a
thing called "Stinger" that scans for and cleans up a small but
germain collection of common malware. Stick to reputable URLs, as
malware may "market" itself as anti-malware freebies.

Else http://users.iafrica.com/c/cq/cquirke/virtest.htm applies, i.e.
if you are using FAT32, you can take the formal approach, and should.

4) Apply general risk management

Beyond the scope of this post; Win9x-centric approaches described in
http://users.iafrica.com/c/cq/cquirke may not be directly applicable
to NT, but the concepts may, and "safe hex" is "safe hex".


Blaster is an example of the new breed of pure worms that can spread
globally within a few minutes (Slammer/Sapphire went global in 10
minutes). Not only does that make a mockery of daily av updates,
these are conceptually significant for another reason - they are
infosphere infectors, not computer or file infectors as most malware
and viruses are, respectively.

It's faster for these worms to re-infect you PC from the "installed
base" of infected systems on the Internet than it is to persist across
runtime by infecting your PC's files or OS runpoints. Many do not
even attempt to do so; switch the PC off, and the malware's gone -
until you reconnect to the infected network again.

With always-on servers, no-longer-needs-rebooting NT, and a
consumerland bulging with fast always-on broadband, this strategy
becomes more viable all the time.

The traditional approach to malware has been malware- rather than
risk-focussed. Just as you'd treat a bacterial infection with
antibiotics, malware has been treated with antivirus software that is
used to "cure" the PC. But just as you can't cure bioviral infections
with antibiotics, you can't clean the whole of the infosphere!

So these new threats demand risk management as the front-line defence.
Software that is stupid enough to allow direct attack is simply
indefensible, and has to be repaired (patched) or avoided.

</paste>


--------------- ----- ---- --- -- - - -
Dreams are stack dumps of the soul
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Back
Top