ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA23196] Microsoft Windows Print Spooler Denial of Service Vulnerability



> ----------------------------------------------------------------------
> 
> TITLE:
> Microsoft Windows Print Spooler Denial of Service Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA23196
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/23196/
> 
> CRITICAL:
> Less critical
> 
> IMPACT:
> DoS
> 
> WHERE:
> From local network
> 
> OPERATING SYSTEM:
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
> 
> DESCRIPTION:
> h07 has discovered a vulnerability in Microsoft Windows, which can be
> exploited by malicious people to cause a DoS (Denial of Service).
> 
> The vulnerability is caused due to an error in the handling of
> "RpcGetPrinterData()" RPC requests within the Print Spooler service
> (spoolsv.exe). This can be exploited to consume almost all available
> memory via a specially crafted packet, which may result in a system
> crash.
> 
> The vulnerability is confirmed on a fully patched Windows 2000 SP4
> system. Other versions may also be affected.
> 
> SOLUTION:
> Restrict access to the service or disable the Print Spooler service.
> 
> PROVIDED AND/OR DISCOVERED BY:
> h07
> 
> ORIGINAL ADVISORY:
> http://milw0rm.com/exploits/2879
> 



 




Copyright © Lexa Software, 1996-2009.