Windows Print Spooler vulnerability could allow remote code execution
Report ID: MS201301001
Date Published: 10 January 2013
Compromise Type: remote-code-execution
Compromise From: remote
Windows Server 2008 R2
A vulnerability in Microsoft Windows Print Spooler might lead to a memory corruption condition, which an attacker could use to execute code on an affected system.
Microsoft has released a security update to address a vulnerability in Windows Print Spooler, which was caused by the component's failure in handling a specially crafted print job. This failure may lead to a memory corruption condition that an attacker could use to execute arbitrary code and take control of a compromised system.
The vulnerability has been addressed in the latest security update by correcting the way of handling print jobs. Users are recommended to install the update onto their system as a protection measure against potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-001)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.