CVE-2008-3479
NONEHeap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a cr
Publicado: 10/15/2008Actualizado: 4/9/2025
Descripción
Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability."
Análisis IAImpulsado por IA
Productos Afectados
microsoftwindows_2000
Referencias
- http://dvlabs.tippingpoint.com/advisory/TPTI-08-07Patch
- http://marc.info/?l=bugtraq&m=122479227205998&w=2
- http://secunia.com/advisories/32260PatchVendor Advisory
- http://www.securityfocus.com/bid/31637Patch
- http://www.securitytracker.com/id?1021052
- http://www.us-cert.gov/cas/techalerts/TA08-288A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2008/2816
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45537
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45538
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5998
- http://dvlabs.tippingpoint.com/advisory/TPTI-08-07Patch
- http://marc.info/?l=bugtraq&m=122479227205998&w=2
- http://secunia.com/advisories/32260PatchVendor Advisory
- http://www.securityfocus.com/bid/31637Patch
- http://www.securitytracker.com/id?1021052
- http://www.us-cert.gov/cas/techalerts/TA08-288A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2008/2816
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45537