Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/4934 | exploit |
https://www.exploit-db.com/exploits/4760 | exploit |
https://www.exploit-db.com/exploits/4745 | exploit |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4474 | signature vdb entry |
http://www.securityfocus.com/archive/1/485268/100/0/threaded | vendor advisory |
http://www.securitytracker.com/id?1019077 | vdb entry |
http://secunia.com/advisories/28011 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/26797 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-07-076.html | |
http://www.us-cert.gov/cas/techalerts/TA07-345A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-065 | vendor advisory |
http://www.vupen.com/english/advisories/2007/4181 | vdb entry |
http://www.securityfocus.com/archive/1/484891/100/0/threaded | mailing list |
http://secunia.com/advisories/28051 | third party advisory vendor advisory |