Palo Alto Networks Discovers Critical Vulnerabilities In Windows Print Spooler And Remote Administration ProtocolPalo Alto Networks Discovers Critical Vulnerabilities In Windows Print Spooler And Remote Administration Protocol
Vulnerabilities allow attackers to remotely execute code and take control of systems
August 15, 2012
SANTA CLARA, Calif., Aug. 14, 2012 /PRNewswire/ -- Palo Alto Networks(TM) (NYSE: PANW), the network security company, today announced that its Threat Research Team was credited with identifying two critical vulnerabilities and one important vulnerability in the Remote Administration Protocol (RAP) and one critical vulnerability in the Windows Print Spooler service.
The discovered critical vulnerability in the Windows Print Spooler - CVE-2012-1851 - is a remote code execution vulnerability that could allow an attacker to run arbitrary code on a user's system with system privileges and take control of the affected system. This vulnerability is in Windows XP and Windows Server 2003 machines. This vulnerability will also result in a Denial of Service state in Windows Vista, Windows 7 and Windows Server 2008.
The discovered critical vulnerabilities in the Remote Administration Protocol - CVE-2012-1852 and CVE-2012-1853 - are heap and stack overflow vulnerabilities that could allow an attacker to remotely take control of the affected system. Both vulnerabilities are in Windows XP.
The discovered important Remote Administration Protocol vulnerability - CVE-2012-1850 - could allow an attacker who successfully exploited this vulnerability to cause a target application to stop responding. CVE-2012-1850 is in multiple versions of Windows and Windows Server.
The Palo Alto Networks Threat Research Team
The Palo Alto Networks Threat Research Team is active in the research community, aggressively pursuing both new vulnerability research and alleviation of all types of threats. The team has leveraged its expertise to uncover a string of critical and important vulnerabilities and has then worked with Microsoft to make sure users are protected.
Read more about:2012
You May Also Like
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023