Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Vulnerability in MSMQ Could Allow Code Execution (Network Check)


Vulnerability Assessment Details

Vulnerability in MSMQ Could Allow Code Execution (Network Check)

Vulnerability Assessment Summary
Acertains if hotfix 892944 has been installed (Network test)

Detailed Explanation for this Vulnerability Assessment

Summary :

Arbitrary code can be executed on the remote host.

Description :

The remote version of Windows is affected by a vulnerability in
Microsoft Message Queuing Service (MSMQ).

A possible hacker may exploit this flaw to execute arbitrary code on the remote
host with the SYSTEM rights.

Solution :

http://www.microsoft.com/technet/security/bulletin/MS05-017.mspx

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 13112

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security

Cables, Connectors

Axiom Memory Kit AX2667R5V/4G 2x 4GB PC2-5300 ECC DDR2
$249.0
Axiom Memory Kit AX2667R5V/4G 2x 4GB PC2-5300 ECC DDR2 pictureUSA 8GB KIT 2x4GB PC3-8500 DDR3-1066MHz 204Pin Unbuffered Sodimm Laptop Memory
$52.9
USA 8GB KIT 2x4GB PC3-8500 DDR3-1066MHz 204Pin Unbuffered Sodimm Laptop Memory pictureLexmark X4650 Printer Memory Card Reader BJ4470G040P2 Ver. A-7
$10.95
Lexmark X4650 Printer Memory Card Reader BJ4470G040P2 Ver. A-7 pictureLot of 4 HP 5065-6330 AMI Series 475 w/memory Modules
$129.99
Lot of 4 HP 5065-6330 AMI Series 475 w/memory Modules picture


Discussions

No Discussions have been posted on this vulnerability.