Palo Alto Networks Discovers Critical Vulnerabilities In Windows Print Spooler And Remote Administration Protocol

Vulnerabilities allow attackers to remotely execute code and take control of systems

August 15, 2012

1 Min Read

PRESS RELEASE

SANTA CLARA, Calif., Aug. 14, 2012 /PRNewswire/ -- Palo Alto Networks(TM) (NYSE: PANW), the network security company, today announced that its Threat Research Team was credited with identifying two critical vulnerabilities and one important vulnerability in the Remote Administration Protocol (RAP) and one critical vulnerability in the Windows Print Spooler service.

The discovered critical vulnerability in the Windows Print Spooler - CVE-2012-1851 - is a remote code execution vulnerability that could allow an attacker to run arbitrary code on a user's system with system privileges and take control of the affected system. This vulnerability is in Windows XP and Windows Server 2003 machines. This vulnerability will also result in a Denial of Service state in Windows Vista, Windows 7 and Windows Server 2008.

The discovered critical vulnerabilities in the Remote Administration Protocol - CVE-2012-1852 and CVE-2012-1853 - are heap and stack overflow vulnerabilities that could allow an attacker to remotely take control of the affected system. Both vulnerabilities are in Windows XP.

The discovered important Remote Administration Protocol vulnerability - CVE-2012-1850 - could allow an attacker who successfully exploited this vulnerability to cause a target application to stop responding. CVE-2012-1850 is in multiple versions of Windows and Windows Server.

The Palo Alto Networks Threat Research Team

The Palo Alto Networks Threat Research Team is active in the research community, aggressively pursuing both new vulnerability research and alleviation of all types of threats. The team has leveraged its expertise to uncover a string of critical and important vulnerabilities and has then worked with Microsoft to make sure users are protected.

Read more about:

2012
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights