Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It doesn't say how this is exploited. Remotely? By having the user print something?


It is exploited by calling a remote procedure call function called rpcAddPrinterDriver. There is a buggy check that lets a user without the adequate privileges to load a driver on the remote system.

Since remote functions can be called locally as well, this is both a remote code execution (RCE) and local privilege escalation (LPE). For more information, see the original source: https://github.com/afwu/PrintNightmare


It says:

- affects print spooler service

- June patch day didn’t resolve the issue

- Local & remote privilege escalation via SMB




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: