Microsoft's PrintNightmare patch doesn't work: researchers :

Microsoft's PrintNightmare patch doesn't work: researchers


By
Juha Saarinen
on Jul 8, 2021 10:19AM
Remote code execution and privilege escalation still possible.
Testing done by security researchers appears to bear out suspicions that Microsoft's urgent out-of-band patch released yesterday does not fully address the critical and exploited PrintNightmare zero-day vulnerability.
United States Computer Emergency Response Team vulnerability analyst Will Dormann raised doubts that Microsoft's patch was sufficient to prevent remote code execution and local privilege escalation to the SYSTEM Windows user.
Further testing done by Mimikatz security tool developer Benjamin Delpy points to Microsoft's patch being bypassable if the Windows Point and Print technology is enabled.
Ho no… thanks to @bugch3ck idea about UNC path, KB5005010 “fix” about #printernightmare does not seems to block RCE (neither LPE) if Point&Print enabled …

Related Keywords

United States , Hong Kong , John Hammond , Benjamin Delpy , Caleb Stewart , United States Computer Emergency Response Team , Microsoft , States Computer Emergency Response Team , Will Dormann , Windows Point , Point Print , Windows Print Spooler , ஒன்றுபட்டது மாநிலங்களில் , ஹாங் காங் , ஜான் சுத்தி , காலேப் ஸ்டீவர்ட் , ஒன்றுபட்டது மாநிலங்களில் கணினி அவசரம் பதில் அணி , மைக்ரோசாஃப்ட் ,

© 2025 Vimarsana