Palo Alto Networks Discovers Critical Vulnerabilities in Windows Print Spooler and Remote Administration Protocol
SANTA CLARA, Calif., Aug. 14, 2012 /PRNewswire/ -- Palo Alto Networks" (NYSE: PANW), the network security company, today announced that its Threat Research Team was credited with identifying two critical vulnerabilities and one important vulnerability in the Remote Administration Protocol (RAP) and one critical vulnerability in the Windows Print Spooler service.
The discovered critical vulnerability in the Windows Print Spooler CVE-2012-1851 is a remote code execution vulnerability that could allow an attacker to run arbitrary code on a user's system with system privileges and take control of the affected system. This vulnerability is in Windows XP and Windows Server 2003 machines. This vulnerability will also result in a Denial of Service state in Windows Vista, Windows 7 and Windows Server 2008.
The discovered critical vulnerabilities in the Remote Administration Protocol CVE-2012-1852 and CVE-2012-1853 are heap and stack overflow vulnerabilities that could allow an attacker to remotely take control of the affected system. Both vulnerabilities are in Windows XP.
The discovered important Remote Administration Protocol vulnerability CVE-2012-1850 could allow an attacker who successfully exploited this vulnerability to cause a target application to stop responding. CVE-2012-1850 is in multiple versions of Windows and Windows Server.
The Palo Alto Networks Threat Research Team
The Palo Alto Networks Threat Research Team is active in the research community, aggressively pursuing both new vulnerability research and alleviation of all types of threats. The team has leveraged its expertise to uncover a string of critical and important vulnerabilities and has then worked with Microsoft to make sure users are protected.
Palo Alto Networks (PLTO), "The Network Security Company," the Palo Alto Networks Logo, App-ID, GlobalProtect, and WildFire are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.
SOURCE Palo Alto Networks