ID:712 - Exploit for Improper access control in Windows and Windows Server - CVE-2010-2729

 
Main Vulnerability Database Exploits ID:712 - Exploit for Improper access control in Windows and Windows Server - CVE-2010-2729

ID:712 - Exploit for Improper access control in Windows and Windows Server - CVE-2010-2729

Published: March 18, 2020


Vulnerability identifier: #VU3475
Vulnerability risk: Critical
CVE-ID: CVE-2010-2729
CWE-ID: CWE-284
Exploitation vector: Remote access
Vulnerable software:
Windows
Windows Server

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to Windows Print Spooler service does not correctly restricts access permissions to create files for anonymous users. A remote attacker can send specially crafted RPC request to vulnerable service and upload malicious file to arbitrary location on the system.

This is a remote code execution vulnerability on Windows XP, since the guest account is enabled by default. On other operating systems this is a privilege escalation vulnerability, as only authenticated users have access to Print Spooler shares.

Successful exploitation of the vulnerability may result in remote code execution.

Note: this vulnerability is being actively exploited.


Remediation

Install patch from Microsoft website.