Thread-topic: [SA23196] Microsoft Windows Print Spooler Denial of Service Vulnerability
> ----------------------------------------------------------------------
>
> TITLE:
> Microsoft Windows Print Spooler Denial of Service Vulnerability
>
> SECUNIA ADVISORY ID:
> SA23196
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/23196/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> DoS
>
> WHERE:
> From local network
>
> OPERATING SYSTEM:
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
>
> DESCRIPTION:
> h07 has discovered a vulnerability in Microsoft Windows, which can be
> exploited by malicious people to cause a DoS (Denial of Service).
>
> The vulnerability is caused due to an error in the handling of
> "RpcGetPrinterData()" RPC requests within the Print Spooler service
> (spoolsv.exe). This can be exploited to consume almost all available
> memory via a specially crafted packet, which may result in a system
> crash.
>
> The vulnerability is confirmed on a fully patched Windows 2000 SP4
> system. Other versions may also be affected.
>
> SOLUTION:
> Restrict access to the service or disable the Print Spooler service.
>
> PROVIDED AND/OR DISCOVERED BY:
> h07
>
> ORIGINAL ADVISORY:
> http://milw0rm.com/exploits/2879
>