1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

(RPC) Service terminated unexpectedly

Discussion in 'Legacy Windows' started by solanabch, 2003/08/11.

Thread Status:
Not open for further replies.
  1. 2003/08/11
    solanabch

    solanabch Inactive Thread Starter

    Joined:
    2002/05/25
    Messages:
    39
    Likes Received:
    0
    When on the internet I am getting the following on my XP box:

    This system is shutting down. Please save all work in progress
    and log off. Any unsaved changes will be lost. This shutdown
    was initiated by NT AUTHORITY\SYSTEM

    Time before shutdown: 00:00:59

    Message:
    Windows must now restart because the Remote Procedure Call
    (RPC) service terminated unexpectedly


    I am on dial-up and would rather not download the Sevice Pack.

    Any fixes out there?

    Thanks in advance.
     
  2. 2003/08/11
    gghartman

    gghartman Inactive

    Joined:
    2002/01/07
    Messages:
    1,130
    Likes Received:
    0
    same problem help

    I have a client that got the same problem today so if anyone has a fix or knows what is happening please help me and the original poster.

    Thanks.
     

  3. to hide this advert.

  4. 2003/08/11
    Abraxas

    Abraxas Inactive

    Joined:
    2002/08/16
    Messages:
    2,361
    Likes Received:
    3
    Last edited: 2003/08/11
  5. 2003/08/11
    daimeionb

    daimeionb Inactive

    Joined:
    2002/08/21
    Messages:
    18
    Likes Received:
    0
    RPC services shutting down

    I have the same issue starting today. The post you suggested doesn't mention this occuring. Is it related to the virus? I use McAfee and it didn't detect a virus.
     
  6. 2003/08/11
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Ehhh... yea, download the fix! It's only 1.26MB

    You could also block port 135,139 & 445 (UDP/TCP) in your firewall.
     
    Arie,
    #5
  7. 2003/08/11
    daimeionb

    daimeionb Inactive

    Joined:
    2002/08/21
    Messages:
    18
    Likes Received:
    0
    I think even after you download the fix, you will need to get the latest virus definitions and remove the virus that is causing the problem. The fix from microsoft only patches the vulnerability, right?

    I just hope I can stay online long enough to download the latest updates to McAfee...
     
  8. 2003/08/11
    gghartman

    gghartman Inactive

    Joined:
    2002/01/07
    Messages:
    1,130
    Likes Received:
    0
    Arie

    What is the name of the virus ??? This one client is a new and I mean new XP install with the latest Norton definitions so how did it get though ???

    Also, in looking at the msconfig I noticed an executable called msblast.exe that wasnt there when I set the machine up at the clients site. I looked on the web and I cant find anything that mentions msblast.exe. Is this the virus's executable ???
     
  9. 2003/08/11
    CPO

    CPO Inactive

    Joined:
    2002/05/10
    Messages:
    7
    Likes Received:
    0
    for anyone that hasn't gone there yet, check the SRC at Symantec. Just downloaded the fix and cleaned two computers. Worked great.

    Both computers are on DSL and connected to a company through VPN. Looks like it spread from the company outward. Hmmm.

    Now have to get them to clean up and lock down the ports TCP 135, and 4444. UDP 69.
     
    CPO,
    #8
  10. 2003/08/11
    Daizy

    Daizy Inactive

    Joined:
    2002/02/19
    Messages:
    2,965
    Likes Received:
    0
  11. 2003/08/11
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    W32.Lovsan.worm Aliases include Win32.Poza (Computer
    Associates), Lovsan (F-Secure) and W32.Blaster.Worm (Symantec)


    From what I read, if you've been infected there may not be a real good way to be sure you have cleaned it up completely.

    Try start~run~cmd and then netstat -A. If you find a listing that you are listening on port 33571 you are probably infected. Good stuff (but technical) at http://isc.sans.org/diary.html?date=2003-08-09

    The latest info I have is that even though the critter likes to come in via port 135, blocking that port can cause some problems and you should be OK blocking TCP/UDP port 69 and TCP port 4444 since the worm /vvirus uses 4444 to FTP out and get the rest of it's payload and until then is fairly harmless.
     
  12. 2003/08/12
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Well, I have had that port blocked for incomming traffic since the Mircrosoft Security article mentioned it, just to see how many times I would be scanned/probed. I have 3 computers on my network, but haven't had any problems with blocking incomming traffic on 135 (and 139).

    I was probed 28 times on the 11th...
     
  13. 2003/08/12
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    There are really no problems blocking INCOMING to Port 135 unless connecting to a MS Exchange server.. As a matter of fact, the Feds have sent notices to major ISP's recommending that they filter Port 135 at the ISP level. Here's what my ISP (COX) has to say:

    http://support.cox.net/custsup/safety/port_135.shtml



    Port 135 Block Implementation
    Recently, the US Department of Homeland Security issued an advisory to Internet Service Providers, including Cox Communications. It warns of a potential network disruption due to a security loophole in the Windows 2000, XP, NT, and 2003 operating systems. This loophole may allow hackers unauthorized access to computers on our Cox High Speed Internet network and the Internet at large, using computer viruses or worms.

    The government has called for the filtering of three ports (ports 135, 137 and 445) to prevent hackers from exploiting the security loopholes. A port is basically a point of connection for a specific type of program. For example, whenever a request is sent to display a web page like www.cox.net, it is sent to port 80. Cox currently filters (in both directions) two of the ports identified in the advisory -- ports 137 and 445. This prevents computers on the Internet from talking to your computer on these ports.

    In the last week, the Cox Abuse department has seen a significant increase in the number of computers on our customer network that have been infected with viruses and worms; we are therefore complying with the Department of Homeland Security Advisory. The spread of infection is due to a high number of users operating exploitable versions of Microsoft Windows, primarily XP and 2000 (i.e. unpatched machines). Cox recommends that customers visit the Microsoft Windows Update website frequently to insure they are updating and protecting themselves from newly discovered exploits.

    Cox anticipates the filter of port 135 will be implemented in all markets by August 10th, 2003.

    Customers who use Microsoft Outlook to connect directly to a Microsoft Exchange server may no longer be able to connect when this port filter is applied. We recommend the use of a Virtual Private Network (VPN) to the company or group who operates the Exchange server. Please contact the network administrator or helpdesk for that company or group for additional details.

    This does not affect customers who use Cox.net e-mail, Webmail, or connect to their Cox.net e-mail with Microsoft Outlook.

    Cox makes every effort to avoid implementing port filters. In this case, we believe that the benefits of protecting the network and continuing to provide customers with the best performing service possible outweigh the possible impact to those customers connecting to Exchange servers.


    Resources:
    Department of Homeland Security Warning
    Microsoft Windows Update


    FAQ’s
    Q: What will be filtered?
    A: Port 135 in incoming (from the Internet to your computer)

    Q: Why are you doing this now?
    A: The US Government has called for the filtering of Port 135 to limit the spread of viruses and worms due to vulnerabilities in the Windows XP and 2000 operating systems; Cox is complying. Also, Cox has recently seen an increase in attempts to exploit these vulnerabilities; primarily in the Windows XP and 2000 operating systems and an increase in infected machines. Unfortunately, many customers have not applied the Windows updates that prevent these vulnerabilities from being exploited. These hacking attempts threaten your computer, the Cox network and the Internet at large, since hackers may attempt to use compromised systems to perform illegal online activity.

    Q: Who will be affected?
    A: Very few customers will be affected by this change. Customers who use Microsoft Outlook to connect directly to a Microsoft Exchange server may no longer be able to connect when this port filter is applied. Port 135 is generally used for connections to Exchange servers on corporate networks. These connections are rarely done over the open Internet.


    Q: What if I need to connect to an Exchange server?
    A: If Exchange server connections are impacted, we recommend you work with the owner of that server and establish a Virtual Private Network (VPN) connection. This will allow you to connect to that network with the additional advantage of encryption.

    Q: How can I get updates for my machine?
    A: Visit the Microsoft Windows Update site to get the latest patches and updates for the Windows Operating System.

    Q: Is this a change to your Acceptable Usage Policy or Subscriber Agreement?
    A: No, this change is made under the terms of the Subscriber Agreement called "Management of Network" which states "Cox reserves the right to manage its network for the greatest benefit of the greatest number of subscribers including, without limitation, the following: rate limiting, rejection or removal of "spam" or otherwise unsolicited bulk email, traffic prioritization, and protocol filtering." You can find the full Subscriber Agreement at: http://www.cox.com/.

    Q. Has Cox blocked or filtered port 135 before?
    A. Yes, Cox has previously filtered port 135 inbound to limit specific types of pop-ups called "netsend" messages. This blocking effort was partially rolled back after use of the exploit died down. Now, Cox will re-instate a complete filter for port 135 inbound. This will prevent your machine from being probed for the exploits.

    Q: Will this filter fix my computer if it is infected?
    A: No. It is only intended to limit the spread of the infection to additional machines. Consult anti-virus services such as McAfee or a PC repair professional for more information.
     
    Last edited: 2003/08/12
  14. 2003/08/12
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    We do run Exchange Server and opted to block outbound ports 69 and 4444 while leaving 135 open. So far, so good.

    Blocking Port 135 would have caused serious business disruptions for us so the slight risk - while watching the network like a hawk - was a better option.

    But for an ISP, I agree with blocking that port.
     
  15. 2003/08/14
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
  16. 2003/08/16
    Cory

    Cory Inactive

    Joined:
    2003/08/16
    Messages:
    2
    Likes Received:
    0
    RPC error

    U need to first go to http://www.symantec.com to download the worm killer before u download the protector. The site will have specific instructions on how to administer the medicine. It will also have a link to download the protector from microsoft.
    I too had this and now I don't.

    Good luck!
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.