Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability."
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5998
https://exchange.xforce.ibmcloud.com/vulnerabilities/45538
https://exchange.xforce.ibmcloud.com/vulnerabilities/45537
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065
http://www.vupen.com/english/advisories/2008/2816
http://www.us-cert.gov/cas/techalerts/TA08-288A.html
http://www.securitytracker.com/id?1021052
http://www.securityfocus.com/bid/31637
http://secunia.com/advisories/32260