Vulnerability Note VU#220821
Microsoft Print Spooler service contains a buffer overflow
A buffer overflow in the Microsoft Print Spooler service may allow a remote attacker to execute arbitrary code on a vulnerable system.
According to Microsoft, the Print Spooler service is
...an executable file that is installed as a service. The spooler is loaded when the operating system starts, and it continues to run until the operating system is shut down. The Print Spooler service manages the printing process, which includes such tasks as retrieving the location of the correct printer driver, loading that driver, spooling high-level function calls into a print job, and scheduling print jobs.
The Print Spooler service (sploolsv.exe) does not properly handle incoming messages, potentially allowing a buffer overflow to occur. If a remote attacker can convince a user to connect to a malicious print server, that attacker may be able to trigger the buffer overflow.
For more information, please refer to MS05-043.
An unauthenticated remote attacker may be able to execute arbitrary code on a vulnerable system. In addition, this vulnerability can be exploited locally by an attacker that has a valid user account on a vulnerable system.
Apply an update
Microsoft has addressed this issue in Microsoft Security Bulletin MS05-043.
Disable the Print Spooler service
2. Double-click Administrative Tools.
3. Double-click Services.
4. Double-click Print Spooler.
5. In the Startup type list, click Disabled.
6. Click Stop, and then click OK.
In addition, issuing the following command from a command prompt will disable the Print Spooler service:
Note that disabling or removing the Print Spooler service on a system will prevent that system from being able to print either locally or remotely.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||09 Aug 2005|
CVSS Metrics (Learn More)
This vulnerability was reported in Microsoft Security Bulletin MS05-043. Microsoft credits Kostya Kortchinsky of CERT RENATER for providing information regarding this vulnerability.
This document was written by Jeff Gennari.
- CVE IDs: CAN-2005-1984
- Date Public: 09 Aug 2005
- Date First Published: 09 Aug 2005
- Date Last Updated: 11 Aug 2005
- Severity Metric: 15.12
- Document Revision: 22
If you have feedback, comments, or additional information about this vulnerability, please send us email.