SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Print Spooler Vendors:   Microsoft
Windows Print Spooler Lets Remote Users Execute Arbitrary Code and Local Users Read Arbitrary Files
SecurityTracker Alert ID:  1022352
SecurityTracker URL:  http://securitytracker.com/id/1022352
CVE Reference:   CVE-2009-0228, CVE-2009-0229, CVE-2009-0230   (Links to External Site)
Date:  Jun 9 2009
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, XP SP2 and SP3, 2003 SP2, Vista SP1 and SP2, 2008, 2008 SP2; and prior service packs
Description:   Three vulnerabilities were reported in Windows Print Spooler. A remote user can execute arbitrary code on the target system. A local user can read arbitrary files on the target system.

A remote user can send a specially crafted RPC request to the print spooler to trigger a buffer overflow and execute arbitrary code on the target system [CVE-2009-0228]. The code will run with the privileges of the target service.

A local user can cause the print spooler to include files with a separator to view arbitrary files on the target system [CVE-2009-0229].

A remote authenticated user can supply a specially crafted DLL path to cause the print spooler to load an arbitrary dynamic link library (DLL) [CVE-2009-0230].

Jun Mao of VeriSign iDefense Labs reported one of these vulnerabilities.

Impact:   A remote user or remote authenticated can execute arbitrary code on the target system.

A local user can read arbitrary files on the target system.

Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?familyid=86378753-db24-44c2-a27d-cc0239f40ab8

Windows XP Service Pack 2 and Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=f2119aca-a98e-4810-be52-f38241443baf

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=22699d09-1e68-456a-8733-bfad6667ebf5

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=865414f8-3f77-4fee-acc6-6684a3dc0aa4

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=197a6cc7-4ba3-4d2e-b621-0ef3da645ef2

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=719efd62-fb33-447d-b6dd-2aaafbbad881

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=3ad8f037-2434-4dea-bfc3-9d3b4008b828

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=85c317cd-2a14-4747-9f50-3af3ddd3ae1b

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=0f18356d-9f09-4d24-8361-970c0d1ccac4

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7d0a6e8d-a31d-4f3d-a7d7-e61215bfebed

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=bbac3deb-6c93-45aa-832c-02b915ac7f44

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms09-022.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms09-022.mspx (Links to External Site)
Cause:   Access control error, Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC