MS-RPC: MS Message Queue Buffer Overflow

This signature detects attempts to exploit a known remote code execution vulnerability against Message Queuing. A successful exploit can allow an attacker to take complete control of the affected system.

Extended Description

A remote buffer overflow vulnerability affects Microsoft Windows. This issue is due to a failure of the affected functionality to properly validate the length of user-supplied strings prior to copying them into static process buffers. This vulnerability may be exploited over RPC. An attacker may exploit this issue to execute arbitrary code with SYSTEM privileges, facilitating unauthorized access or privilege escalation. It should be noted that MSMQ is not installed by default on affected platforms and must be manually installed for a computer to be vulnerable. The vulnerability is reportedly not present on computers that only enable MSMQ HTTP Message Delivery.

Affected Products

Microsoft windows_xp_media_center_edition

Short Name
MS-RPC:MSGQU-FRNAME
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
MS-RPC
Keywords
Buffer CVE-2005-0059 CVE-2007-3039 MS Message Overflow Queue bid:13112 bid:26797
Release Date
04/12/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.0

10.0

Found a potential security threat?