Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-2729 | First vendor Publication | 2010-09-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7358 | |||
Oval ID: | oval:org.mitre.oval:def:7358 | ||
Title: | Print Spooler Service Impersonation Vulnerability | ||
Description: | The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2729 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2011-02-17 | Microsoft Print Spooler Service Impersonation Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2010-09-15 | Name : Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2... File : nvt/secpod_ms10-061.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67988 | Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Pro... Windows contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is triggered by a flaw in the Print Spooler service, which fails to restrict access to print spoolers via RPC. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-09-16 | IAVM : 2010-A-0124 - Microsoft Windows Print Spooler Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0025362 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-05-28 | Microsoft Windows Print Spooler arbitrary file write attempt RuleID : 17253 - Revision : 4 - Type : NETBIOS |
2014-01-10 | Microsoft Windows Print Spooler arbitrary file write attempt RuleID : 17252 - Revision : 16 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-20 | Name : Arbitrary code can be executed on the remote host due to a flaw in the Spoole... File : spoolsv_kb2347290.nasl - Type : ACT_ATTACK |
2010-09-14 | Name : Arbitrary code can be executed on the remote host due to a flaw in the Spoole... File : smb_nt_ms10-061.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:34 |
|
2024-11-28 12:22:26 |
|
2024-08-02 12:14:04 |
|
2024-08-02 01:03:48 |
|
2024-02-02 01:13:39 |
|
2024-02-01 12:03:44 |
|
2023-12-07 21:28:04 |
|
2023-09-05 12:12:43 |
|
2023-09-05 01:03:35 |
|
2023-09-02 12:12:45 |
|
2023-09-02 01:03:37 |
|
2023-08-12 12:15:10 |
|
2023-08-12 01:03:37 |
|
2023-08-11 12:12:49 |
|
2023-08-11 01:03:45 |
|
2023-08-06 12:12:20 |
|
2023-08-06 01:03:39 |
|
2023-08-04 12:12:25 |
|
2023-08-04 01:03:40 |
|
2023-07-14 12:12:21 |
|
2023-07-14 01:03:38 |
|
2023-03-29 01:14:08 |
|
2023-03-28 12:03:44 |
|
2022-10-11 12:11:01 |
|
2022-10-11 01:03:25 |
|
2021-05-04 12:11:49 |
|
2021-04-22 01:12:24 |
|
2020-05-23 13:16:55 |
|
2020-05-23 00:26:08 |
|
2019-02-26 17:19:33 |
|
2018-10-31 00:20:05 |
|
2018-10-13 00:22:58 |
|
2018-09-20 12:08:25 |
|
2017-09-19 09:23:51 |
|
2016-09-30 01:02:28 |
|
2016-08-31 12:02:12 |
|
2016-08-05 12:02:33 |
|
2016-06-28 18:16:16 |
|
2016-04-26 19:58:08 |
|
2015-05-28 21:26:29 |
|
2014-02-17 10:56:28 |
|
2014-01-19 21:26:58 |
|
2013-11-11 12:38:50 |
|
2013-05-10 23:29:03 |
|