MS-RPC: Message Queue Overflow (3)

This signature detects attempts to exploit a known vulnerability against MS-RPC Message Queue request. By sending overlong free-form string queue requests, which can cause invalid client replies, an attacker can cause a buffer overflow and compromise the affected system.

Extended Description

A remote buffer overflow vulnerability affects Microsoft Windows. This issue is due to a failure of the affected functionality to properly validate the length of user-supplied strings prior to copying them into static process buffers. This vulnerability may be exploited over RPC. An attacker may exploit this issue to execute arbitrary code with SYSTEM privileges, facilitating unauthorized access or privilege escalation. It should be noted that MSMQ is not installed by default on affected platforms and must be manually installed for a computer to be vulnerable. The vulnerability is reportedly not present on computers that only enable MSMQ HTTP Message Delivery.

Affected Products

Microsoft windows_xp_media_center_edition

Short Name
MS-RPC:OF:MSG-QUEUE-3
Severity
Major
Recommended
False
Recommended Action
Drop
Category
MS-RPC
Keywords
(3) CVE-2005-0059 Message Overflow Queue bid:13112
Release Date
06/15/2005
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3724
False Positive
Unknown
Vendors

Microsoft

CVSS Score

10.0

Found a potential security threat?