9
CVSSv2

CVE-2007-3039

Published: 12/12/2007 Updated: 16/10/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 920
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows malicious users to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft message_queuing

Exploits

/* Windows Message Queuing Service Remote RPC BOF Exploit (MS07-065) Mod of axis's code CHANGELOG - added dnsname as a parameter, before it was hardcoded in the request data (Marcin Kozlowski) Provided for legal security research and testing purposes ONLY Go through the code :) */ #include <stdioh> #include <stdlibh> #i ...
****************************************************************************** ********************** merry christmas Sysadmins ***************************** ****************************************************************************** ************** Microsoft Message Queue POC exploit ( MS07-065 ) ************** Mario Ballano - (mballano~gmail ...
/* Windows Message Queuing Service Remote RPC BOF Exploit (MS07-065) by axis wwwph4nt0morg you should know the dnsname of target to trigger this vuln the service runs on port 2103/2105/2107 D:\soft\develop\MyProjects\temp\Debug>tempexe -h 192168152100 -p 2103 ------------------------------------------------------------------ ...
## # $Id: ms07_065_msmqrb 9929 2010-07-25 21:37:54Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...