Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45538 | vdb entry |
http://secunia.com/advisories/32260 | third party advisory patch vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45537 | vdb entry |
http://www.securitytracker.com/id?1021052 | vdb entry |
http://dvlabs.tippingpoint.com/advisory/TPTI-08-07 | patch |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5998 | vdb entry signature |
http://www.securityfocus.com/bid/31637 | vdb entry patch |
http://www.vupen.com/english/advisories/2008/2816 | vdb entry |