banner



Windows printing flaws can still hack your PC — here's what to do

Windows printing flaws tin can still hack your PC — here'due south what to do

A close-up of a big fat red 'Print' button on on a computer keyboard.
(Epitome credit: BorisShevchuk/Shutterstock)

Microsoft's print nightmare doesn't seem to want to end.

Ane more, and perhaps ii more, serious security flaws related to the Windows PrintNightmare flaw were revealed in the past few days. Until Microsoft provides software updates, the only way to completely protect your organization from attacks using at least one of these flaws is to completely disable printing.

  • Windows hit by 'PrintNightmare' exploit — what you need to know
  • The best antivirus software you tin can buy or get for gratuitous
  • Plus: New Windows 11 and 10 flaw lets anyone have over your PC — what to do

Similar the PrintNightmare flaw that was accidentally disclosed, and and then partly patched, in late June and early July, these new flaws abuse the Print Spooler service in Windows.

The beginning flaw was July 15 in an unexpected Microsoft security bulletin. It allows an assailant with local admission — such as malware that has already infected your automobile by other ways, or a baddie sitting down at your machine while you're logged on but have stepped away — to "escalate privileges" and gain total control of the machine.

"An assaulter who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges," Microsoft said in its bulletin. "An attacker could and so install programs; view, change, or delete data; or create new accounts with full user rights."

"The workaround for this vulnerability is stopping and disabling the Print Spooler service," the software maker dryly added.

In other words, to mitigate (though not truly fix) this flaw, you lot've got to disable press entirely. We've got instructions on how to do so below.

Is this prepare really for you?

But hold on: If you lot're using a PC at dwelling house, AND you lot've got some of the best Windows 10 antivirus software installed to prevent malware infection, AND you trust the people you live with not to mess with your PC, you may not need to take such drastic measures.

Exploitation of this flaw (Microsoft gave it the catalogue number CVE-2021-34481) is a higher risk for PC users in workplaces who are networked (locally) to dozens of other machines and who may leave their PCs unlocked while they go get coffee or use the bathroom.

Credit for the discovery of this flaw goes to a security researcher named Jacob Baines, who plans to disembalm his findings at the DEF CON hacker briefing adjacent calendar month. He was a little perplexed that Microsoft chose to reveal the flaw publicly before a fix was available.

"The MS advisory/CVE was a surprise to me and, as far as I'm concerned, it wasn't a coordinated disclosure," Baines wrote in a tweet. He added that he had privately disclosed the flaw to Microsoft on June 18.

Run into more

Microsoft said in its message that information technology was "developing a security update" to ready this flaw, only did not provide a timetable.

The company didn't give details about exactly what the flaw is, but Baines' DEF CON synopsis hints that information technology has something to exercise with installing a vulnerable print driver using the Windows PrintDemon, Print Spooler and Point and Print services.

He promises to show "three examples" which suggests that he may have found more than ane flaw, or more one mode to exploit the same flaw.

A different flaw, or a variant of the same one?

That sounds like it might overlap with the second Windows press security vulnerability disclosed in the past few days, as revealed by French hacker Benjamin Delpy on July 16.

Run into more than

Delpy told Bleeping Computer that he plant a loophole in a the Windows Point and Impress feature that permits download and installation over the internet of print drivers that aren't verified by Microsoft.

Point and Print is already bad enough, as it lets unprivileged Windows users — who unremarkably aren't immune to install system-level software — download and install printer drivers from local printers. Fortunately, Signal and Print isn't found often on abode PCs, being more of an enterprise thing.

Simply those drivers are supposed to exist signed by Microsoft. Delpy plant that he could become around this and deliver malicious printer drivers by having a PC connect to ii similar printers at around the same time. (Nosotros don't quite understand exactly how it works.)

Will Dormann, a researcher at the U.S.-government-funded CERT Coordination Center (CERT-CC) in Pittsburgh, confirmed that Delpy's exploit "works well."

Run into more

Now, whether this the same flaw as what Baines disclosed to Microsoft, we can't tell. Delpy says his exploit works over the internet, permitting remote code execution by far-off hackers instead of just local-privilege escalation by nearby hackers. And once more, Delpy'south flaw doesn't really apply to home PCs, while Baines' flaw does. But they practise broadly sound the same.

Dormann wrote upwardly an official CERT-CC security bulletin that warns about Delpy's as-yet-uncatalogued flaw. The mitigations are to "block outbound SMB traffic at your network purlieus" and "configure PackagePointAndPrintServerList," which won't brand sense to home users.

How to disable Print Spooler

Nonetheless, domicile users can implement Microsoft's end-gap solution to the catalogued flaw that was disclosed earlier. Again, this kills your ability to print, so think twice before doing this.

To disable Print Spooler, y'all've got to pretend you're an Information technology pro and burn upwards Windows PowerShell, which is kind of a more powerful version of the standard Windows Control Prompt tool. Fortunately, PowerShell has been built into Windows since Windows 7.

1. Search for "PowerShell" in the search field next to the Windows icon in the lesser left of your Windows 10 screen

2. Right-click on "Windows PowerShell" in the search results and select "Run equally administrator".

3. Type in your Windows administrative password. If you already regularly run Windows as an administrator (and y'all shouldn't), then information technology's simply your regular login countersign.

iv. In the PowerShell window, type

              Become-Service -Name Spooler            

then the Enter primal.

You'll become a brief condition report telling yous whether Print Spooler is running and enabled. If it is, then accept the side by side steps.

5. Type in

              Terminate-Service -Name Spooler -Forcefulness            

and and then striking the Enter key. This disables Print Spooler during your current Windows session.

vi. Blazon in

              Set-Service -Name Spooler -StartupType Disabled            

and then hit the Enter key. This disables Impress Spooler birthday until you manually restart it once more.

How to re-enable Print Spooler

Of course, you'll desire to make press possible again once this flaw is stock-still.

To restart Print Spooler, fire up PowerShell over again, type in

              Start-Service -Proper noun Spooler -Strength            

and and so hit the Enter key.

To make the alter permanent, type in

              Set-Service -Proper name Spooler -StartupType Enabled            

and striking the Enter key.

Paul Wagenseil is a senior editor at Tom'southward Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-booty driver, code monkey and video editor. He's been rooting around in the information-security space for more than than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random Telly news spots and even moderated a console discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/more-windows-print-nightmares

Posted by: rodriguezwitarsted.blogspot.com

0 Response to "Windows printing flaws can still hack your PC — here's what to do"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel