meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, July 2nd, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 July 2021

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Special Podcast: Print Spooler Vulnerability (CVE-2021-34527, CVE-2021-1675) Update/Summary #printnightmare

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to this somewhat special edition of the Sansa and Storm Center's Stormcast.

0:07.2

This is for Friday, July 2nd.

0:09.1

Now, I mentioned that I wasn't going to produce a podcast for Friday this week because of the July 4th holiday.

0:18.1

But I want to do a quick podcast, just summarizing what we know for now about

0:24.6

this Brent nightmare vulnerability. And late yesterday we finally did get an official statement

0:31.7

from Microsoft about this vulnerability. So we do have a new CVE number now and also some advice from Microsoft directly as to

0:42.5

how to mitigate this vulnerability.

0:46.0

So first of all, the new CVE number is CVE 2021-34-5227.

0:53.2

The original one was CVE 2021-52-7. The original one was CBE 2021-1675. If you remember, that original vulnerability was patched with the June 6th patch Tuesday update. So Microsoft decided to assign this vulnerability a new CBE number as it's pretty much a

1:14.9

different issue than the issue that was patched in June. Also, as part of the show notes,

1:23.2

you'll see links to various references. That's pretty much where I pulled the information from for this

1:30.8

podcast. And let's start with the nature of the vulnerability. So the problem here is a function

1:37.9

that allows you to add a printer driver. This is typically only allowed for administrators or print operators. And administrators

1:48.8

and print operators are able to do so remotely. So if you have a remote print spooler,

1:55.0

these two groups are authorized to add a printer driver. And of course, printer drivers,

2:00.8

they are DLs, they are code,

2:03.0

and that code runs as a system.

2:07.5

The problem here is that due to a flaw in how they actually figure out who is authorized

2:14.9

to add a printer driver, any user is actually able to add printer drivers.

2:22.1

And this is what this vulnerability and this exploit is all about.

2:27.0

Normal user is able to connect to the print spooler

2:30.9

and able to call this RPC add printer driver function and add

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.