|CERT-In Vulnerability Note
Microsoft Windows Message Queuing Service Privilege Escalation Vulnerability
Original Issue Date:October 15, 2014
Severity Rating: MEDIUM
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with Service Pack 2 for Itanium-based systems
A vulnerability has been reported in Microsoft Windows Message Queuing (MSMQ) service which could allow an attacker to gain elevated privileges on the targeted system.
The vulnerability is due to improper handling of objects in memory by MSMQ service. A local attacker could exploit the vulnerability by sending a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation could allow a local attacker to gain elevated privileges.
Note: Successful exploitation requires that the Message Queuing component is installed (not installed by default) and enabled.
- Disable the Message Queuing Service
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
The information provided herein is on "as is" basis, without warranty of any kind.
Email: email@example.com Phone: +91-11-24368572
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003