Remote Procedure Call (RPC) service terminated

Help!
I got the following error msg twice while i was connected to Internet.

"This shutdown is initiated by NT AUTHORITY\SYSTEM Time before shutdown: 00:00:59 Message: Windows
must now restart because the Remote Procedure Call (RPC) service terminated..."

after that my PC restarts normally...Anyone got an idea what"s all that about??
I scanned for viruses , trojans etc and my system seems clean.
I have WinXP pro , SP1
 
Nt Authority system shutdown

Load of people seem to have been gertting it today me included as nothing has changed or been loaded on my system not sure what the problem is but searched Google and downloaded a patch from microsoft
WindowsXP-KB823980-x86-ENU and so far so good
its the 32 bit version but sods law being what it is I will sit and pick me nose for 10 minutes as its always come up before then

VILLA21 said:
Help!
I got the following error msg twice while i was connected to Internet.

"This shutdown is initiated by NT AUTHORITY\SYSTEM Time before shutdown: 00:00:59 Message: Windows
must now restart because the Remote Procedure Call (RPC) service terminated..."

after that my PC restarts normally...Anyone got an idea what"s all that about??
I scanned for viruses , trojans etc and my system seems clean.
I have WinXP pro , SP1
 
You may have been exploited by someone over the net... plz check HERE and change/update your firewall.
Another "exploit" you might have encountered is installing DriveImage 7, which gave the same message in many systems- the only difference is that DI 7 is much worse than an exploit... :p
 
Last edited:
well 10 minutes is up and I am still logged on so either the patch has worked or it was just a short term thing
I had been shut down about 8 times
heres hoping

pongles said:
Load of people seem to have been gertting it today me included as nothing has changed or been loaded on my system not sure what the problem is but searched Google and downloaded a patch from microsoft
WindowsXP-KB823980-x86-ENU and so far so good
its the 32 bit version but sods law being what it is I will sit and pick me nose for 10 minutes as its always come up before then
 
digging about on the net i found this info

This is a security flaw in Microsoft Windows, mainly NT/XP/Server.
If you see this message you should install Windows updates as soon as possible. There is basically someone out there sending data to your PC causing this to happen.




Advisory Warning to all users of the following operating systems:

Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003

Your Microsoft Operating System may potentially be under attack by HACKER ACTIVITY. The vulnerability attack can fool software into accepting insecure commands that could let intruders steal data, delete files or eavesdrop on e-mails.

Due to the seriousness of this vulnerability the Department of Homeland Security and Microsoft encourages system administrators and computer owners to update vulnerable versions of Microsoft Windows operating systems as soon as possible.

Our recommendation is to please go to:

http://microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp to install the patch immediately.
see if this helps you guys ?! it sounds to me like a flaw in windows xp/nt systems that judging by microsuck appears to be hole thats exploitable by hackers possibly scannign systems randomly for this flaw perhaps !?

this fix cures it apparently lemme know how you get on after patching :)
 
;) All in a days work vespa glad it sorted it out :)

Note here too people the W32.Blaster.Worm according to symantec

was only JUST Discovered on: August 11, 2003

so current antivirus products will not detect this untill the next update no doubt :(

So make sure you update as soon as possible :)
 
VIPER_1069 said:
;) All in a days work vespa glad it sorted it out :)

Note here too people the W32.Blaster.Worm according to symantec

was only JUST Discovered on: August 11, 2003

so current antivirus products will not detect this untill the next update no doubt :(

So make sure you update as soon as possible :)
Shit! u r right, it"s the msblast.exe on my system, running as service also.
I"m at the office now, dowloading the MS patch.

Thanxs!
 
...and that"s what it does:

"

When W32.Blaster.Worm is executed, it does the following:

1. Creates a Mutex named "BILLY." If the mutex exists, the worm will exit.

2. Adds the value:

"windows auto update"="msblast.exe"

to the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when you start Windows.

3. Calculates the IP address, based on the following algorithm, 40% of the time:

Host IP: A.B.C.D

sets D equal to 0.

if C > 20, will subtract a random value less than 20.

Once calculated, the worm will start attempting to exploit the computer based on A.B.C.0, and then count up.

NOTE: This means the Local Subnet will become saturated with port 135 requests prior to exiting the local subnet.

4. Calculates the IP address, based on many random numbers, 60% of the time:

A.B.C.D

set D equal to 0.

sets A, B, and C to random values between 0 and 255.

5. Sends data on TCP port 135 that may exploit the DCOM RPC vulnerability to allow the following actions to occur on the vulnerable computer:

Create a hidden Cmd.exe remote shell that will listen on TCP port 4444.

NOTE: Due to the random nature of how the worm constructs the exploit data, it may cause computers to crash if it sends incorrect data.

6. Listens on UDP port 69. When the worm receives a request, it will return the Msblast.exe binary.

7. Sends the commands to the remote computer to reconnect to the infected host and to download and run Msblast.exe.

8. If the current month is after August, or if the current date is after the 15th, the worm will perform a DoS on "windowsupdate.com."

With the current logic, the worm will activate the DoS attack on the 16th of this month, and continue until the end of the year.

The worm contains the following text, which is never displayed:

I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ? Stop making money and fix your software!!......"

Great sense of houmor from these guys...:)
 
ok, seems i"m safe now :)
That"s the procedure that worked for me( it"s easy) :

- turn off System Restore option for XP/Me users,
- donwload and aply the patch-fix for the DCOM hole on XP/2000 systems
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp

- Stop the proccess of " msblast.exe " with alt+ctrl+del
- delete the msblast.exe file located in /windows/system32 dir
- delete the following key in registry:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
"windows auto update"="msblast.exe"
- Reboot, Done!

PS: All XP/2000 users should aply the above patch-fix for the DCOM hole, as this worm spreads so fast and maybe a new one exploiting this MS security hole is on the way :)
 
Last edited:
"Block RPC call" is currently the most popular thing in my firewall log - it's taken over from the usual netbios probing on UDP 137/139 etc.

This is BIG - I know my usual firewall pattern, and while I wouldn't call this a storm, it's pretty damn close.

Firewall and Antivirus updates are a necessity!
 
glad to of helped guys... ya all have to just learn how to use GOOGLE a little more ;) hehe :D

everything you every need to know is sitting out there waiting to be found :)
 
VIPER_1069 said:
glad to of helped guys... ya all have to just learn how to use GOOGLE a little more ;) hehe :D

everything you every need to know is sitting out there waiting to be found :)
I did not use Google or anything, but it does not take a genious to see that the above is an exploit! :D
 
Top