MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) (EMERALDTHREAD) (uncredentialed check)

critical Nessus Plugin ID 49286

Synopsis

Arbitrary code can be executed on the remote host due to a flaw in the Spooler service.

Description

The version of the Print Spooler service on the remote Windows host is affected by a service impersonation vulnerability that allows an unauthenticated, remote attacker to execute arbitrary code on a Windows XP system to escalate privileges on all other supported Windows systems.

EMERALDTHREAD is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a group known as the Shadow Brokers.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

https://www.nessus.org/u?32e6c705

Plugin Details

Severity: Critical

ID: 49286

File Name: spoolsv_kb2347290.nasl

Version: 1.25

Type: local

Agent: windows

Family: Windows

Published: 9/20/2010

Updated: 8/5/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2010-2729

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/14/2010

Vulnerability Publication Date: 9/14/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (MS10-061 Microsoft Print Spooler Service Impersonation Vulnerability)

Reference Information

CVE: CVE-2010-2729

BID: 43073

IAVA: 2010-A-0124-S

MSFT: MS10-061

MSKB: 2347290