{"id":20904,"date":"2021-08-06T01:03:59","date_gmt":"2021-08-05T23:03:59","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20904"},"modified":"2022-06-27T09:19:41","modified_gmt":"2022-06-27T07:19:41","slug":"0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/","title":{"rendered":"0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"margin: 0px 10px 0px 0px\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]In the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print allows installation of arbitrary files<\/a> I had reported about a new vulnerability in Windows. A remote print server, which can be reached by unauthorized persons, allows to install arbitrary malicious files on the clients via point-and-print. In the article I had also mentioned ways to mitigate it. Now ACROS Security has presented a free 0Patch solution for various Windows Server versions that prevents exploitation of the vulnerability.<\/p>\n<p><!--more--><\/p>\n<h2>New attack vector print server<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/75902e3b8ed94d63a5e3e4a375b01d09\" width=\"1\" height=\"1\">Security researcher Benjamin Delpy has published several variants of the attack vector for the printer interface. The attacker sets up a printer with a modified driver on a computer he controls. In the second step, he then installs this printer on another Windows computer using Point and Print. Through this move, he gains complete control over that computer even as a normal user. While this is only a local privilege escalation, it becomes a problem when the attacker, in conjunction with social engineering, gets a user to execute malicious code locally. <\/p>\n<h2>The 0Patch solution <\/h2>\n<p>The team at ACROS Security, which has been providing the 0Patch solution for years, analyzed the vulnerability and quickly developed a micropatch to render the vulnerability harmless. Mitja Kolsek brought this free solution to my attention via <a href=\"https:\/\/twitter.com\/0patch\/status\/1423272711883796480\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1423272711883796480\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"0Patch-L&ouml;sung \" alt=\"0Patch-L&ouml;sung \" src=\"https:\/\/i.imgur.com\/I3UZnbw.png\"><\/a>  <\/p>\n<p>The details are described in <a href=\"https:\/\/blog.0patch.com\/2021\/08\/free-micropatches-for-malicious-printer.html\" target=\"_blank\" rel=\"noopener\">this blog post<\/a> from 0patch. The 0patch micropatches are available for free for the following products:  <\/p>\n<ol>\n<li><b>Windows Server 2019<\/b> (updated with July 2021 Updates)\n<li><b>Windows Server 2016<\/b> (updated with July 2021 Updates)\n<li><b>Windows Server 2012 R2 <\/b>(updated with July 2021 Updates)\n<li><b>Windows Server 2012 <\/b>(updated with July 2021 Updates)\n<li><b>Windows Server 2008 R2 <\/b>(updated with January 2020 Updates, no Extended Security Updates)<i> <\/i>\n<li><b>Windows Server 2008 R2 <\/b>(updated with January 2021 Updates, first year of Extended Security Updates only)<i> <\/i>\n<li><b>Windows Server 2008 R2 <\/b>(updated with July 2021 Updates, second year of Extended Security Updates)<i> <\/i>\n<li><b>Windows 10 v21H1 <\/b>(updated with July Updates)\n<li><b>Windows 10 v20H2 <\/b>(updated with July Updates)\n<li><b>Windows 10 v2004 <\/b>(updated with July Updates)<b> <\/b>\n<li><b>Windows 10 v1909 <\/b>(updated with July Updates)<b> <\/b>\n<li><b>Windows 10 v1903 <\/b>(updated with December 2020 Updates &#8211; latest before end of support)\n<li><b>Windows 10 v1809 <\/b>(updated with May 2021 Updates &#8211; latest before end of support)<b> <\/b>\n<li><b>Windows 10 v1803 <\/b>(updated with May 2021 Updates &#8211; latest before end of support)<b><br \/><\/b>\n<li><b>Windows 10 v1709 <\/b>(updated with October 2020 Updates &#8211; latest before end of support)\n<li><b>Windows 7 <\/b>(updated with January 2020 Updates, no Extended Security Updates)\n<li><b>Windows 7 <\/b>(updated with January 2021 Updates, first year of Extended Security Updates only)\n<li><b>Windows 7 <\/b>(updated with July 2021 Updates, second year of Extended Security Updates)<\/li>\n<\/ol>\n<p>Notes on how the 0patch agent works, which loads the micropatches into memory at the runtime of an application, can be found in the blog posts (such as <a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/05\/windows-7-mit-der-0patch-lsung-absichern-teil-2\/\">here<\/a>).<\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates<\/a> \u2013 Part 1<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution<\/a> \u2013 Part 2<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/11\/08\/0patch-untersttzt-office-2010-nach-dem-supportende-mit-micropatch\/\">0patch supports Office 2010 with micro patches after the end of support (EOL)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/\">0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixes a Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixes Windows Installer 0-day Local Privilege Escalation vulnerability<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\">0patch fixes 0-day in Internet Explorer<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/24\/0patch-fixt-cve-2021-2687-im-dns-server-von-windows-server-2008-r2\/\">0patch fixes CVE-2021-26877 in the DNS server of Windows Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/05\/07\/0patch-fixt-windows-installer-lpe-bug-cve-2021-26415\/\">0patch fixes Windows Installer LPE-Bug (CVE-2021-26415)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/05\/18\/0patch-bietet-support-fr-windows-10-version-1809-nach-eol\/\">0Patch provides support for Windows 10 version 1809 after EOL<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/06\/21\/windows-10-v180x-0patch-fixt-ie-schwachstelle-cve-2021-31959\/\">Windows 10 V180x: 0Patch fixes IE vulnerability CVE-2021-31959<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]In the blog post PrintNightmare: Point-and-Print allows installation of arbitrary files I had reported about a new vulnerability in Windows. A remote print server, which can be reached by unauthorized persons, allows to install arbitrary malicious files on the clients &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-20904","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20904"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20904\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}