Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows MSMQ (message queuing) privilege escalation
updated since 11.08.2009
Published:12.08.2009
Source:
SecurityVulns ID:10143
Type:local
Threat Level:
6/10
Description:DoS conditions in the service lead to named channel spoofing possibility.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
CVE:CVE-2009-1922 (The Message Queuing (aka MSMQ) service for Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP2, and Vista Gold does not properly validate unspecified IOCTL request data from user mode before passing this data to kernel mode, which allows local users to gain privileges via a crafted request, aka "MSMQ Null Pointer Vulnerability.")
Original documentdocumentValery Marchuk, [PT-2008-09] Microsoft Windows MSMQ Privilege Escalation Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-040 - Important Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032) (11.08.2009)
Files:Microsoft Security Bulletin MS09-040 - Important Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod