This security update addresses a vulnerability in the Print Spooler service.
Once successfully exploited, this could result to remote code execution when an
attacker sends a specially crafted print request to a system with a print
spooler interface exposed over RPC.
For Trend Micro clients using Trend Micro Deep Security and OfficeScan with Intrusion Defense Firewall (IDF), please refer to the table below for the filter identifier(s) specific to this advisory's vulnerability identifier(s):
Identifier & Title
IDF First Pattern Version
IDF First Pattern Release Version
1004401 - Print Spooler Service Impersonation Vulnerability
Sept 15, 2010
Trend Micro Deep Security DPI Rule Number: 1004401
AFFECTED SOFTWARE AND VERSION
Windows 7 for 32-bit Systems
Windows 7 for x64-based Systems
Windows Server 2003 Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Vista Service Pack 1
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1
Windows Vista x64 Edition Service Pack 2
Windows XP Professional x64 Edition Service Pack 2
A complete discussion of the different vulnerability categories, including case studies of vulnerable SCADA HMIs. The paper also provides a guide for vulnerability researchers, as well as vendors on quick and efficient bug discovery.
Cybercriminals can turn unsecure home routers into slaves for their botnets or even abuse them to steal banking credentials. Know about your router’s hidden weaknesses and the many ways you can defend your homes and businesses against these threats.