The Microsoft Windows Print Spooler fails to properly handle malformed RPC requests. This vulnerability may allow a remote attacker to cause a denial-of-service condition.
The Microsoft Print Spooler service manages printing operations on a system. The Print Spooler service fails to properly handle malformed RPC requests. This vulnerability can be triggered by sending a specially crafted RPC request to a vulnerable system.
Note that exploit code for this vulnerability is publicly available.
A remote, unauthenticated attacker could consume large amounts of system resources on an affected device, thereby creating a denial of service.
We are unaware of a solution to this problem. Until a solution becomes available the following workarounds are strongly encouraged:
Disable the Print Spooler service
1. Click Start, and then click Control Panel. Alternatively, point to Settings, and then click Control Panel.
Note that disabling or removing the Print Spooler service on a system will prevent that system from being able to print either locally or remotely.
This vulnerability was reported by h07.
This document was written by Jeff Gennari.
|Date First Published:||2006-12-05|
|Date Last Updated:||2006-12-05 20:45 UTC|