Skip to primary content

Prime-WoW

My site, my way, no big company can change this

Prime-WoW

Main menu

  • Home
  • Discord
  • Forums
  • Games
    • 7DtD
      • 7DtD Map
      • 7DtD Official Forums
      • 7DtD Wiki
    • Minecraft
      • Survival Map
      • Vanilla Map
      • FTB Map
      • FTB Wiki
      • Download FTB Client
    • NWN
      • NWN Wiki
      • NWN Lexicon
      • NWN Vault
      • NWNX
      • NWN Info
      • Rhun Guide
    • Terraria
      • Terraria Map
    • WoW
      • Prime-WoW Site
      • WoW Armory
  • Unfiltered RSS
    • Bikes
    • Games
      • Kotaku
      • PS4 News
      • VR
    • Nature
      • TreeHugger
      • Survival
    • Technology
      • Hardware
        • Hot Hardware
      • Linux
        • Linux Today
        • LWN.net
        • LXer
        • Phoronix
        • RPi
      • LifeHacker
      • Akihabara News
      • AnandTech
      • Ars Technica
      • Engadget
      • Gear & Gadgets
      • Geekologie
      • Gizmodo
      • [H]ardOCP
      • io9
      • Slashdot
      • TG Daily

Post navigation

← Previous Next →

Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

Posted on July 7, 2021 by Xordac Prime
Skull and crossbones in binary code

Enlarge (credit: Getty Images)

An emergency patch Microsoft issued on Tuesday fails to fully fix a critical security vulnerability in all supported versions of Windows that allows attackers to take control of infected systems and run code of their choice, researchers said.

The threat, colloquially known as PrintNightmare, stems from bugs in the Windows print spooler, which provides printing functionality inside local networks. Proof-of-concept exploit code was publicly released and then pulled back, but not before others had copied it. Researchers track the vulnerability as CVE-2021-34527.

A big deal

Attackers that can exploit print capabilities are exposed to the Internet. Attackers can also use it to escalate system privileges once they’ve used a different vulnerability to gain a toe-hold inside of a vulnerable network. In either case, the adversaries can then gain control of the domain controller, which as the server that authenticates local users, is one of the most security-sensitive assets on any Windows network.

Read 11 remaining paragraphs | Comments



Source: Ars Technica – Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

This entry was posted in Ars Technica, Unfiltered RSS and tagged Ars Technica by Xordac Prime. Bookmark the permalink.
Proudly powered by WordPress