SMB: Windows Print Spooler Authentication Bypass

This signature detects attempts to exploit a known vulnerability against Windows Print Spooler. A successful attack allows attackers to bypass security measures and execute arbitrary remote code.

Extended Description

Microsoft Windows is prone to a remote code-execution vulnerability that affects the Print Spooler Service. A remote attacker can exploit this issue to execute code with SYSTEM-level privileges. Local attackers able to submit print jobs can exploit this issue to gain elevated privileges. NOTE: To exploit this issue, an attacker must have permissions to submit print jobs on the vulnerable system. Guest access to shared print services is enabled by default on Windows XP; later systems will require the attacker to authenticate to the server, or require the server to be configured to allow anonymous access.

Affected Products

Avaya messaging_application_server,Microsoft windows_server_2008_for_itanium-based_systems

Short Name
SMB:EXPLOIT:PRINT-SPOOL-BYPASS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
Authentication Bypass CVE-2010-2729 Print Spooler Windows bid:43073
Release Date
09/14/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?