MS16-087: Security Update for Windows Print Spooler (3170005)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- A remote code execution vulnerability exists in the
Windows Print Spooler service due to improper validation
of print drivers while installing a printer from network
servers. An unauthenticated, remote attacker can exploit
this vulnerability, via a man-in-the-middle attack on a
workstation or print server or via a rogue print server,
to execute arbitrary code in the context of the current
user. (CVE-2016-3238)

- An elevation of privilege vulnerability exists in the
Windows Print Spooler service due to improperly allowing
arbitrary writing to the file system. An attacker can
exploit this issue, via a specially crafted script or
application, to execute arbitrary code with elevated
system privileges. (CVE-2016-3239)

See also :

https://technet.microsoft.com/library/security/MS16-087

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 92018 ()

Bugtraq ID: 91609
91612

CVE ID: CVE-2016-3238
CVE-2016-3239

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now