4.9 • 696 Ratings
🗓️ 1 July 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 1st, 2021 edition of the Sandton and Storm Center's Stormcast. |
0:08.1 | My name is Johannes. |
0:09.2 | Ulrich, and then I'm recording from Jacksonville, Florida. |
0:13.7 | If there's one thing that you do want to take care of before you're heading in the hopefully extended weekend, at least here in the US, than it is CBE |
0:23.5 | 2021-1675, a Windows print spooler vulnerability that also has been called print nightmare. |
0:33.9 | This vulnerability essentially affects all versions of Windows that are currently being supported, |
0:41.3 | and it was patched this June in the June-patched Tuesday update, but apparently it wasn't patched completely. |
0:51.0 | There was also a little bit of mislabeling going on here where initially Microsoft |
0:55.7 | labeled this as a privilege escalation vulnerability, but earlier this week, Microsoft updated |
1:02.8 | the advisory and did label it as a remote code execution vulnerability. And what really made this even worse is that it appears that |
1:13.3 | the patch was incomplete and the day before yesterday, a proof of concept exploit for this vulnerability |
1:21.5 | was published on GitHub. The initial GitHub repository was quickly taken down by the author, but there are multiple |
1:30.8 | forks of this GitHub repository, and the code is pretty easily available. |
1:37.3 | So well, what do you need to do? |
1:39.4 | There is no patch. |
1:40.4 | Well, definitely make sure that you did apply the June patches, but as mentioned, |
1:45.8 | the patch that was published by Microsoft does not protect you from this proof of concept |
1:52.9 | that was published. Your next best option is to disable the print spooler, of course, |
1:59.6 | with that you may break printing. There are, |
2:03.2 | of course, certain high-value systems like your domain controllers that usually don't really |
2:08.8 | have any business printing, so you probably definitely want to disable the print spooler |
2:14.2 | on these systems. Now, if there's anything good about this vulnerability, then it is that an attacker does |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.