• MS05-017 Microsoft Message Queueing Service Path Overflow
    Disclosure Date: 2005-04-12
    First seen: 2020-04-26
    exploit/windows/dcerpc/ms05_017_msmq
    This module exploits a stack buffer overflow in the RPC interface to the Microsoft Message Queueing service. The offset to the return address changes based on the length of the system hostname, so this must be provided via the 'HNAME' option. Much thanks to snort.org and Jean-Baptiste Marchand's excellent MSRPC website. Authors: - hdm <x@hdm.io>
1 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!