Check Point Reference: | CPAI-2006-279 |
Date Published: | 28 Feb 2010 |
Severity: | High |
Last Updated: | Tuesday 15 November, 2011 |
Source: | |
Industry Reference: | CVE-2006-6114 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Windows operating systems include a Print Spooler service, spoolsv.exe, which is started up with the system on most default installations. The print spooler service exports an Remote Procedure Call (RPC) interface to the server side of the spooler's Win32 API. A buffer overflow vulnerability exists in the Novell Client Print Provider module. The flaw may be exploited by sending a malicious request message to the Print Spooler RPC interface. Successful exploitation may allow an attacker to inject and execute arbitrary code on the target host with system-level privileges. In an attack case where code injection is not successful, the Print Spooler service, which loads the Novell Client Print Provider, will terminate abnormally, creating a denial of service to printing service. Other Windows services are not affected. Note that on Windows XP platforms, it is observed that after the denial of service attack, the Print Spooler service cannot be restarted successfully until after a system reboot. If a code execution attempt is carried out successfully, the behavior of the target host is dependent on the intention of the injected code. The injected code is executed with System level privileges |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: MS-RPC over CIFS Enforcement Violation.
Attack Information: Novell client print provider buffer overflow