module

MS07-065 Microsoft Message Queueing Service DNS Name Path Overflow

Disclosed
Dec 11, 2007
Created
May 30, 2018

Description

This module exploits a stack buffer overflow in the RPC interface
to the Microsoft Message Queueing service. This exploit requires
the target system to have been configured with a DNS name and
for that name to be supplied in the 'DNAME' option. This name does
not need to be served by a valid DNS server, only configured on
the target machine.

Author

hdm x@hdm.io

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/dcerpc/ms07_065_msmq
msf exploit(ms07_065_msmq) > show targets
...targets...
msf exploit(ms07_065_msmq) > set TARGET < target-id >
msf exploit(ms07_065_msmq) > show options
...show and set options...
msf exploit(ms07_065_msmq) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.