SB2023101034 - Multiple vulnerabilities in Microsoft Message Queuing
Published: October 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 20 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-36592)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
2) Input validation error (CVE-ID: CVE-2023-36572)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
3) Input validation error (CVE-ID: CVE-2023-36570)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
4) Input validation error (CVE-ID: CVE-2023-36590)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
5) Input validation error (CVE-ID: CVE-2023-36575)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
6) Input validation error (CVE-ID: CVE-2023-36591)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
7) Input validation error (CVE-ID: CVE-2023-36606)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
8) Input validation error (CVE-ID: CVE-2023-36573)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
9) Input validation error (CVE-ID: CVE-2023-36579)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
10) Input validation error (CVE-ID: CVE-2023-36583)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
11) Input validation error (CVE-ID: CVE-2023-36581)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
12) Input validation error (CVE-ID: CVE-2023-36697)
The vulnerability allows a remote user to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote administrator can trick a victim on the target machine to connect to a malicious server and execute arbitrary code on the target system.
13) Input validation error (CVE-ID: CVE-2023-36431)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
14) Input validation error (CVE-ID: CVE-2023-36593)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
15) Input validation error (CVE-ID: CVE-2023-36582)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
16) Input validation error (CVE-ID: CVE-2023-36589)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
17) Input validation error (CVE-ID: CVE-2023-36571)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
18) Input validation error (CVE-ID: CVE-2023-35349)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
19) Input validation error (CVE-ID: CVE-2023-36578)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
20) Input validation error (CVE-ID: CVE-2023-36574)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Message Queuing. A remote user can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36592
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36572
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36570
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36590
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36575
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36591
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36606
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36573
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36579
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36583
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36581
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36697
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36431
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36593
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36582
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36589
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36571
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35349
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36578
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36574