---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Microsoft Windows Print Spooler Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35365 VERIFY ADVISORY: http://secunia.com/advisories/35365/ DESCRIPTION: Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to disclose sensitive information, and by malicious users and malicious people to compromise a vulnerable system. 1) An error exists in the Windows Print Spooler within the parsing of certain printing data structures. This can be exploited via a specially crafted RPC request to cause a buffer overflow when an affected system parses the "ShareName" of a malicious print server during enumeration. Successful exploitation may allow execution of arbitrary code. 2) An error exists in the Windows Printing Service when processing separator pages. This can be exploited by a local user to read or print arbitrary files from the local system via a specially crafted separator page. 3) An error in the Windows Print Spooler can be exploited by an authenticated user to load arbitrary DLLs and execute arbitrary code via a specially crafted RPC request. SOLUTION: Apply patches. Microsoft Windows 2000 SP4: http://www.microsoft.com/downloads/details.aspx?familyid=86378753-db24-44c2-a27d-cc0239f40ab8 Windows XP SP2/SP3: http://www.microsoft.com/downloads/details.aspx?familyid=f2119aca-a98e-4810-be52-f38241443baf Windows XP Professional x64 Edition SP2: http://www.microsoft.com/downloads/details.aspx?familyid=22699d09-1e68-456a-8733-bfad6667ebf5 Windows Server 2003 SP2: http://www.microsoft.com/downloads/details.aspx?familyid=865414f8-3f77-4fee-acc6-6684a3dc0aa4 Windows Server 2003 x64 Edition SP2: http://www.microsoft.com/downloads/details.aspx?familyid=197a6cc7-4ba3-4d2e-b621-0ef3da645ef2 Windows Server 2003 with SP2 for Itanium-based Systems: http://www.microsoft.com/downloads/details.aspx?familyid=719efd62-fb33-447d-b6dd-2aaafbbad881 Windows Vista (optionally with Service Pack 1 or 2): http://www.microsoft.com/downloads/details.aspx?familyid=3ad8f037-2434-4dea-bfc3-9d3b4008b828 Windows Vista x64 Edition (optionally with Service Pack 1 or 2): http://www.microsoft.com/downloads/details.aspx?familyid=85c317cd-2a14-4747-9f50-3af3ddd3ae1b Windows Server 2008 for 32-bit Systems (optionally with Service Pack 2): http://www.microsoft.com/downloads/details.aspx?familyid=0f18356d-9f09-4d24-8361-970c0d1ccac4 Windows Server 2008 for x64-based Systems (optionally with Service Pack 2): http://www.microsoft.com/downloads/details.aspx?familyid=7d0a6e8d-a31d-4f3d-a7d7-e61215bfebed Windows Server 2008 for Itanium-based Systems (optionally with Service Pack 2): http://www.microsoft.com/downloads/details.aspx?familyid=bbac3deb-6c93-45aa-832c-02b915ac7f44 PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Jun Mao of VeriSign iDefense Labs. 2, 3) Reported by the vendor. ORIGINAL ADVISORY: Microsoft (KB961501): http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------