The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm | third party advisory |
http://www.vupen.com/english/advisories/2009/1541 | vdb entry third party advisory |
http://www.securityfocus.com/bid/35209 | vdb entry third party advisory |
http://osvdb.org/54934 | vdb entry broken link |
http://www.us-cert.gov/cas/techalerts/TA09-160A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6287 | vdb entry third party advisory signature |
http://secunia.com/advisories/35365 | third party advisory |
http://www.securitytracker.com/id?1022352 | vdb entry third party advisory |