Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Huawei Data Communication: Remote Code Execution Vulnerability in Microsoft Windows Print Spooler Service (huawei-sa-20171222-01-windows)

Information

Severity

Severity

Critical

Family

Family

Huawei

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Microsoft released a security bulletin MS10-061 to publicly disclose a remote code execution vulnerability in the Print Spooler service.

Insight

Insight

Microsoft released a security bulletin MS10-061 to publicly disclose a remote code execution vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system. (Vulnerability ID: HWPSIRT-2017-05163)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2010-2729.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.

Affected Software

Affected Software

AnyOffice versions V200R002C10 V200R002C20 V200R005C02 SMC2.0 versions V100R003C10 V100R005C00 V500R002C00 Secospace AntiDDoS8000 versions V100R001C00 V500R001C00 V500R001C20 V500R001C60 V500R001C80 Secospace AntiDDoS8160 versions V100R001C00SPC300

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

See the referenced vendor advisory for a solution.

Common Vulnerabilities and Exposures (CVE)