Executive Summary
Summary | |
---|---|
Title | Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) |
Informations | |||
---|---|---|---|
Name | MS10-061 | First vendor Publication | 2010-09-14 |
Vendor | Microsoft | Last vendor Modification | 2010-09-29 |
Severity (Vendor) | Critical | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.1 (September 29, 2010): Added a link to Microsoft Knowledge Base Article 2347290 under Known Issues in the Executive Summary.Summary: This security update resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-061.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7358 | |||
Oval ID: | oval:org.mitre.oval:def:7358 | ||
Title: | Print Spooler Service Impersonation Vulnerability | ||
Description: | The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2729 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2011-02-17 | Microsoft Print Spooler Service Impersonation Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2010-09-15 | Name : Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2... File : nvt/secpod_ms10-061.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67988 | Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Pro... Windows contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is triggered by a flaw in the Print Spooler service, which fails to restrict access to print spoolers via RPC. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-09-16 | IAVM : 2010-A-0124 - Microsoft Windows Print Spooler Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0025362 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-05-28 | Microsoft Windows Print Spooler arbitrary file write attempt RuleID : 17253 - Revision : 4 - Type : NETBIOS |
2014-01-10 | Microsoft Windows Print Spooler arbitrary file write attempt RuleID : 17252 - Revision : 16 - Type : OS-WINDOWS |
Metasploit Database
id | Description |
---|---|
2010-09-14 | MS10-061 Microsoft Print Spooler Service Impersonation Vulnerability |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-20 | Name : Arbitrary code can be executed on the remote host due to a flaw in the Spoole... File : spoolsv_kb2347290.nasl - Type : ACT_ATTACK |
2010-09-14 | Name : Arbitrary code can be executed on the remote host due to a flaw in the Spoole... File : smb_nt_ms10-061.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:13 |
|
2015-05-28 21:26:36 |
|
2014-02-17 11:46:40 |
|
2014-01-19 21:30:30 |
|
2013-11-11 12:41:18 |
|