Microsoft pushes emergency update for Windows PrintNightmare zero-day
#1
Exclamation 
Quote:Microsoft has released the KB5004945 emergency security update to fix the actively exploited PrintNightmare zero-day vulnerability in the Windows Print Spooler service impacting all Windows versions. However, the patch is incomplete and the vulnerability can still be locally exploited to gain SYSTEM privileges.
 
The remote code execution bug (tracked as CVE-2021-34527) allows attackers to take over affected servers via remote code execution (RCE) with SYSTEM privileges, as it will enable them to install programs, view, change, or delete data, and create new accounts with full user rights.
 
Detailed instructions on how to install these out-of-band security updates for your operating system, are available in the support documents linked below:

Read more: Microsoft pushes emergency update for Windows PrintNightmare zero-day (bleepingcomputer.com)
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Messages In This Thread
Microsoft pushes emergency update for Windows PrintNightmare zero-day - by silversurfer - 07 July 21, 16:58

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Internet Download Manager 6.32 Build 9
Internet Download ...Kool — 05:17
AntGROUP Inc. / VCap-developer
Ant Download Manager...jasonX — 01:54
Windows 11 Build 26300.8493 Brings Movab...
Microsoft has rele...harlan4096 — 16:55
Google Chrome 148.0.7778.167/168
The security updat...harlan4096 — 07:15
Microsoft Edge 148.0.3967.70
Version 148.0.3967...harlan4096 — 07:12

[-]
Birthdays
Today's Birthdays
avatar (49)contjrat
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (39)axuben
avatar (40)ihijudu
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>