Vigil@nce - Windows: use after free via Print Spooler
June 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use a freed memory area in the Print Spooler of
Windows, in order to trigger a denial of service, and possibly to
execute privileged code.
Impacted products: Windows 2008, Microsoft Windows 2012, Windows
7, Windows 8, Windows RT, Windows Vista
Severity: 2/4
Creation date: 11/06/2013
DESCRIPTION OF THE VULNERABILITY
The Print Spooler of Windows processes print tasks.
However, when the connection to a printer is removed, a memory
area is not correctly freed. Technical details are unknown.
An attacker can therefore use a freed memory area in the Print
Spooler of Windows, in order to trigger a denial of service, and
possibly to execute privileged code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-use-after-free-via-Print-Spooler-12966