Links
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
    Type 1 or more characters for results.
    2 results tagged patch  ✕
    InfoSec Handlers Diary Blog https://isc.sans.edu/diary/rss/26124
    Thu May 14 23:43:11 2020 archive.org
    thumbnail

    Looking at our patch Tuesday list, I looked a bit closer at CE-2020-1048 (Print Spooler Privilege Escalation) and Microsoft's ratings for that one. Microsoft rated this as:

    Disclosed: NO
    Exploited: NO
    Exploitability (old and new versions)

    Unfortunately, this vulnerabiltiy was actually disclosed to Microsoft by the research community (see below), so the code to exploit it absolutely does exist and was disclosed, and a full write-up was posted as soon as the patch came out:
    https://windows-internals.com/printdemon-cve-2020-1048/

    Long story short, on an unpatched system, you can plant a persistent backdoor on a target host with this one-liner in PowerShell:

      Add-PrinterPort -Name c:\windows\system32\ualapi.dll

    Then "print" an MZ file (DOS excecutable) to that printer to light it up.

    As noted, this backdoor is persistent, and will remain in place even after you apply the patch!

    Moral of the story? For me, there are a couple of them:

    • Don't put too much stock in risk ratings assigned to patches. "Lows" and "Mediums" can bite you just as badly as vulnerabilities rated as "High". This goes for patches as well as scan results or pentest results. If your policy is to patch only Severe and High rated issues, you'll pay for that eventually.
    • Also, it's a good thing that more vendors are going to monolithic patching. If you apply the current patch set from Microsoft, you get them all - there's no more "cherry picking" allowed!
    windows backdoor patch
    Heartbleed : Faille critique pour OpenSSL, correctifs disponibles en urgence | UnderNews http://www.undernews.fr/alertes-securite/heartbleed-faille-critique-pour-openssl-correctifs-disponibles-en-urgence.html
    Wed Apr 9 16:06:20 2014 archive.org
    thumbnail

    Heartbleed : Faille critique pour OpenSSL, correctifs disponibles en urgence | UnderNews

    OpenSSL Hack Faille Security debian Patch
    1578 links, including 7 private
    Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn