This Metasploit module exploits a stack overflow in the Windows Routing and Remote Access Service. Since the service is hosted inside svchost.exe, a failed exploit attempt can cause other system services to fail as well. A valid username and password is required to exploit this flaw on Windows 2000.
47054366204902bd94eaba8eae3d382f1284a1330486cc63fc5b83ed691498df
Symantec Security Advisory - Symantec Backup Exec for Windows Server suffers from a RPC interface heap overflow and a flaw that allows an authorized user potential elevation of privileges.
03ad6e1c64722d551b6b3f6ac32e1e9d0e937875878c5a07543ff895cdb51ea8
Microsoft RRAS MSO6-025 stack overflow exploit written for Metasploit.
1ac3a6897535861d739bee991b0370b66b6632632fc19720b291005b3b7b8be7