Lucene search

K
saintSAINT CorporationSAINT:44689A596CEDCE74BBD68651D92B63D3
HistoryJun 16, 2009 - 12:00 a.m.

Windows Print Spooler EnumeratePrintShares buffer overflow

2009-06-1600:00:00
SAINT Corporation
www.saintcorporation.com
20

0.736 High

EPSS

Percentile

97.8%

Added: 06/16/2009
CVE: CVE-2009-0228
BID: 35206

Background

The Windows Print Spooler manages the printing process on Windows operating systems.

Problem

A buffer overflow vulnerability in the EnumeratePrintShares function in the Windows Print Spooler service allows arbitrary command execution when a specially crafted ShareName is received from a malicious print server.

Resolution

Apply the patch referenced in Microsoft Security Bulletin 09-022.

References

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=806&gt;

Limitations

Exploit works on Windows 2000.

Exploit requires the ability to bind to port 445/TCP on the SAINTexploit host.

The Crypt::DES, Digest::MD4, and Digest::MD5 packages are required to run this exploit. These packages are available from <http://cpan.org/modules/by-module/&gt;.

Platforms

Windows 2000

0.736 High

EPSS

Percentile

97.8%