Tag
#Line Printer Daemon Service (LPD)
**How could an attacker exploit this vulnerability?** An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server.
**The following mitigating factors might be helpful in your situation:** * Users are advised against installing or enabling the Line Printer Daemon (LPD) service. * The LPD is not installed or enabled on the systems by default. * The LPD has been announced as deprecated since Windows Server 2012. Please refer to: Features Removed or Deprecated in Windows Server 2012.
**According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?** An unauthenticated attacker with LAN access could exploit this vulnerability.