MS.Windows.Message.Queuing.Service.CVE-2023-36606.DoS
Description
This indicates an attack attempt to exploit a Denial of Service Vulnerability in Microsoft Windows.
The vulnerability is due to improper handling of the incoming MSMQ traffic. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to a MSMQ server. Successful exploitation could result in the denial of service on the target machine.
Affected Products
Microsoft Windows 10
Microsoft Windows 11
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Microsoft Windows Server 2012
Microsoft Windows Server 2012 (Server Core installation)
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 R2 (Server Core installation)
Microsoft Windows Server 2016
Microsoft Windows Server 2016 (Server Core installation)
Microsoft Windows Server 2019
Microsoft Windows Server 2019 (Server Core installation)
Microsoft Windows Server 2022
Microsoft Windows Server 2022 (Server Core installation)
Impact
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |