Article 5KZGZ Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

by
Dan Goodin
from Ars Technica - All content on (#5KZGZ)
GettyImages_SkullCrossbonesBinaryCompute

Enlarge (credit: Getty Images)

An emergency patch Microsoft issued on Tuesday fails to fully fix a critical security vulnerability in all supported versions of Windows that allows attackers to take control of infected systems and run code of their choice, researchers said.

The threat, colloquially known as PrintNightmare, stems from bugs in the Windows print spooler, which provides printing functionality inside local networks. Proof-of-concept exploit code was publicly released and then pulled back, but not before others had copied it. Researchers track the vulnerability as CVE-2021-34527.

A big deal

Attackers can exploit it remotely when print capabilities are exposed to the Internet. Attackers can also use it to escalate system privileges once they've used a different vulnerability to gain a toe-hold inside of a vulnerable network. In either case, the adversaries can then gain control of the domain controller, which as the server that authenticates local users, is one of the most security-sensitive assets on any Windows network.

Read 12 remaining paragraphs | Comments

index?i=nq107UF-O60:1Fxaw7-HFbc:V_sGLiPB index?i=nq107UF-O60:1Fxaw7-HFbc:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments