Metasploit modules that can be used to exploit Microsoft » Message Queuing
-
MS07-065 Microsoft Message Queueing Service DNS Name Path Overflow
Disclosure Date: 2007-12-11First seen: 2020-04-26exploit/windows/dcerpc/ms07_065_msmqThis module exploits a stack buffer overflow in the RPC interface to the Microsoft Message Queueing service. This exploit requires the target system to have been configured with a DNS name and for that name to be supplied in the 'DNAME' option. This name does not need to be served by a valid DNS server, only configured on the target machine. Authors: - hdm <x@hdm.io>
1 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details