First published: Wed Jun 10 2009(Updated: )
The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows Server | =2008 | |
Microsoft Windows Server | =2008 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0230 has a critical severity rating due to its potential to allow remote authenticated users to gain elevated privileges.
To fix CVE-2009-0230, it is recommended to apply the latest security patches or updates provided by Microsoft for affected Windows versions.
CVE-2009-0230 affects Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista, and Server 2008 SP2.
CVE-2009-0230 exploits a vulnerability in the Windows Print Spooler through a crafted RPC message that loads a DLL from an arbitrary directory.
Temporary workarounds for CVE-2009-0230 include disabling the Print Spooler service if it is not needed to mitigate potential exploitation.