Vulnerability in Print Spooler Service Could Allow Remote Code Execution
This safety update of ms10 065, ms10 062 resolves a publicly disclosed susceptibility in the Print Spooler service. The weakness could allow distant code execution if an attacker sends a particularly crafted print request to a susceptible system that has a print spooler interface bare over RPC. By default, printers are not shared on any at present supported Windows operating system.( ms10 065, ms10 062 )
This safety update is rated Dangerous for all supported editions of Windows XP, and Significant for all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the susceptibility by correcting the way in which the Printer Spooler service validates user permissions. .
The bulk of customers have routine updating enabled and will not need to take any action because this safety update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update yourself. For information about exact configuration options in routine updating, see Microsoft Knowledge Base Article 294871.
For administrators and venture installations, or end users who want to install this security update yourself, Microsoft recommends that clientele apply the update right away using update organization software, or by examination for updates by the Microsoft Update service.