Could you use IDS with TCP Reset to detect and reset the connections implementing the attacks? I haven't researched for you, but perhaps Signatures already exist in Cisco's definitions to detect known LSASS and RCP buffer overflow expolits, or custom Sigs could be constructed from information from other sources (Snort signatures, CVS, etc.)
Just a thought.