- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Microsoft Windows Message Queuing Service Stack Overflow Vulnerability
------------------------------------------------------------------------
SUMMARY
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Microsoft Windows with the Message Queuing
Service enabled.
Authentication is not required to exploit this vulnerability. Exploitation
of this issue can result in arbitrary code execution.
DETAILS
Affected Products:
* Windows 2000 SP4
* Windows XP SP2
The specific flaw exists in the RPC interface defined on port 2103 with
UUID fdb3a030-065f-11d1-bb9b-00a024ea5525. During the processing of opnum
0x06 the service copies user-supplied information into a fixed length
stack buffer. Sending at least 300 bytes will trigger a stack based buffer
overflow due to a vulnerable wcscat() call.
Vendor Response:
Microsoft has issued an update to correct this vulnerability. More details
can be found at:
<http://www.microsoft.com/technet/security/bulletin/ms07-065.mspx>
http://www.microsoft.com/technet/security/bulletin/ms07-065.mspx
Disclosure Timeline:
* 2007.04.02 - Vulnerability reported to vendor
* 2007.12.11 - Coordinated public release of advisory
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3039>
CVE-2007-3039
ADDITIONAL INFORMATION
The information has been provided by ZDI-07-076.
The original article can be found at:
<http://www.zerodayinitiative.com/advisories/ZDI-07-076.html>
http://www.zerodayinitiative.com/advisories/ZDI-07-076.html
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment