Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-3039 | First vendor Publication | 2007-12-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3039 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:4474 | |||
Oval ID: | oval:org.mitre.oval:def:4474 | ||
Title: | Vulnerability in Message Queuing Could Allow Remote Code Execution | ||
Description: | Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-3039 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
SAINT Exploits
Description | Link |
---|---|
Microsoft Message Queuing queue name buffer overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-07-25 | Microsoft Message Queueing Service DNS Name Path Overflow |
2008-01-18 | MS Windows Message Queuing Service RPC BOF Exploit (dnsname) |
2007-12-21 | MS Windows 2000 AS SP4 Message Queue Exploit (MS07-065) |
2007-12-18 | MS Windows Message Queuing Service - RPC BOF Exploit (MS07-065) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
39123 | Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution A stack overflow exists in Windows. The Message Queuing Service fails to validate information received via the RPC interface resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMCreateObjectInternal object call overflow attempt RuleID : 14627 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMCreateObjectInternal object call overflow attempt RuleID : 14626 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMCreateObjectInternal little endian object call ove... RuleID : 14625 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMCreateObjectInternal little endian object call ove... RuleID : 14624 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 mqqm QMCreateObjectInternal overflow attempt RuleID : 14623 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMCreateObjectInternal overflow attempt RuleID : 14622 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMObjectPathToObjectFormat little endian object call... RuleID : 14621 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMObjectPathToObjectFormat little endian object call... RuleID : 14620 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMObjectPathToObjectFormat object call overflow attempt RuleID : 14619 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMObjectPathToObjectFormat object call overflow attempt RuleID : 14618 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMObjectPathToObjectFormat little endian overflow at... RuleID : 14617 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 mqqm QMObjectPathToObjectFormat overflow attempt RuleID : 14616 - Revision : 5 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMObjectPathToObjectFormat little endian overflow at... RuleID : 13215 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP v4 mqqm QMObjectPathToObjectFormat overflow attempt RuleID : 13214 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 mqqm QMObjectPathToObjectFormat little endian overflow... RuleID : 13213 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMObjectPathToObjectFormat overflow attempt RuleID : 13212 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMObjectPathToObjectFormat overflow attempt RuleID : 13211 - Revision : 19 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMObjectPathToObjectFormat overflow attempt RuleID : 13210 - Revision : 19 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMCreateObjectInternal overflow attempt RuleID : 12982 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMCreateObjectInternal little endian overflow attempt RuleID : 12981 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 mqqm QMCreateObjectInternal overflow attempt RuleID : 12980 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP v4 mqqm QMCreateObjectInternal little endian overflow att... RuleID : 12979 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP mqqm QMCreateObjectInternal overflow attempt RuleID : 12978 - Revision : 18 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP mqqm QMCreateObjectInternal overflow attempt RuleID : 12977 - Revision : 20 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-12 | Name : Arbitrary code can be executed on the remote host. File : msmqs_overflow2.nasl - Type : ACT_GATHER_INFO |
2007-12-11 | Name : Arbitrary code can be executed on the remote host. File : smb_nt_ms07-065.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:15:38 |
|
2024-11-28 12:12:33 |
|
2020-05-23 13:16:49 |
|
2020-05-23 00:19:54 |
|
2019-03-19 12:02:28 |
|
2018-10-16 21:19:59 |
|
2018-10-13 00:22:37 |
|
2017-10-11 09:23:59 |
|
2016-06-28 23:55:52 |
|
2016-04-26 16:12:54 |
|
2014-02-17 10:40:26 |
|
2014-01-19 21:24:13 |
|
2013-05-11 10:27:30 |
|