A buffer overflow in the Microsoft Print Spooler service may allow a remote attacker to execute arbitrary code on a vulnerable system.
According to Microsoft, the Print Spooler service is
...an executable file that is installed as a service. The spooler is loaded when the operating system starts, and it continues to run until the operating system is shut down. The Print Spooler service manages the printing process, which includes such tasks as retrieving the location of the correct printer driver, loading that driver, spooling high-level function calls into a print job, and scheduling print jobs.
An unauthenticated remote attacker may be able to execute arbitrary code on a vulnerable system. In addition, this vulnerability can be exploited locally by an attacker that has a valid user account on a vulnerable system.
Apply an update
Microsoft has addressed this issue in Microsoft Security Bulletin MS05-043.
Disable the Print Spooler service
This vulnerability was reported in Microsoft Security Bulletin MS05-043. Microsoft credits Kostya Kortchinsky of CERT RENATER for providing information regarding this vulnerability.
This document was written by Jeff Gennari.
|Date First Published:||2005-08-09|
|Date Last Updated:||2005-08-11 19:31 UTC|