KB5029247: Windows Server 2019 Security Update (August 2023)
A crafted MSMQ message can give an attacker SYSTEM-level code execution on any Windows Server with MSMQ installed.
An attacker who can reach TCP 1801 on a Windows Server with MSMQ installed can send a single crafted message that triggers the integer overflow and runs code as SYSTEM. No credentials, no user interaction.
MSMQ listens on TCP 1801 when installed. An integer overflow in MSMQ's message-processing logic causes the service to allocate too small a buffer for a crafted message with manipulated size parameters; the subsequent copy overflows the buffer and corrupts memory, leading to code execution as the MSMQ service.
Probably yes if any of these apply:
Affected OS versions
A penetration tester finds an internal Windows Server with MSMQ listening on 1801 — installed years ago for a since-decommissioned application. One crafted message later, the tester has SYSTEM. MSMQ continues to be one of the highest-yield "forgotten attack surface" finds in modern Windows networks.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5029247Manual remediation steps
Check whether MSMQ is installed and exposed
Get-WindowsFeature -Name MSMQ* | Where-Object Installed
Get-NetTCPConnection -LocalPort 1801 -State Listen -ErrorAction SilentlyContinue
If MSMQ is not needed, removing the feature is the strongest mitigation.
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5029247 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5029247
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5029247 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.