Overview
The Microsoft Windows Print Spooler fails to properly handle malformed RPC requests. This vulnerability may allow a remote attacker to cause a denial-of-service condition.
Description
The Microsoft Print Spooler service manages printing operations on a system. The Print Spooler service fails to properly handle malformed RPC requests. This vulnerability can be triggered by sending a specially crafted RPC request to a vulnerable system. Note that exploit code for this vulnerability is publicly available. |
Impact
A remote, unauthenticated attacker could consume large amounts of system resources on an affected device, thereby creating a denial of service. |
Solution
We are unaware of a solution to this problem. Until a solution becomes available the following workarounds are strongly encouraged: |
Disable the Print Spooler service 1. Click Start, and then click Control Panel. Alternatively, point to Settings, and then click Control Panel. Note that disabling or removing the Print Spooler service on a system will prevent that system from being able to print either locally or remotely. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by h07.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 8.98 |
Date Public: | 2006-12-04 |
Date First Published: | 2006-12-05 |
Date Last Updated: | 2006-12-05 20:45 UTC |
Document Revision: | 13 |