Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
#1
Google's Project Zero team has made public details of an improperly patched zero-day security vulnerability in Windows print spooler API that could be leveraged by a bad actor to execute arbitrary code.
 
Details of the unpatched flaw were revealed publicly after Microsoft failed to patch it within 90 days of responsible disclosure on September 24.
 
Originally tracked as CVE-2020-0986, the flaw concerns an elevation of privilege exploit in the GDI Print / Print Spooler API ("splwow64.exe") that was reported to Microsoft by an anonymous user working with Trend Micro's Zero Day Initiative (ZDI) back in late December 2019.
 
But with no patch in sight for about six months, ZDI ended up posting a public advisory as a zero-day on May 19 earlier this year, after which it was exploited in the wild in a campaign dubbed "Operation PowerFall" against an unnamed South Korean company.
 
"splwow64.exe" is a Windows core system binary that allows 32-bit applications to connect with the 64-bit printer spooler service on 64-bit Windows systems. It implements a Local Procedure Call (LPC) server that can be used by other processes to access printing functions.
 
Successful exploitation of this vulnerability could result in an attacker manipulating the memory of the "splwow64.exe" process to achieve execution of arbitrary code in kernel mode, ultimately using it to install malicious programs; view, change, or delete data; or create new accounts with full user rights.
 
However, to achieve this, the adversary would first have to log on to the target system in question.
 
Although Microsoft eventually addressed the shortcoming as part of its June Patch Tuesday update, new findings from Google's security team reveals that the flaw has not been fully remediated.

Source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Kaspersky discloses iPhone hardware feature vital in Operation Triangulation case mrtrout 0 597 12-31-2023 , 08:38 AM
Last Post: mrtrout
  Volvo Cars discloses security breach leading to R&D data theft mrtrout 0 699 12-11-2021 , 12:25 AM
Last Post: mrtrout
  Valve's Source Engine Cheating Exploit Has Remained Unpatched For Two Years Bjyda 0 816 04-13-2021 , 05:09 PM
Last Post: Bjyda
  World's largest pathologists association discloses credit card incident tarekma7 0 814 04-10-2021 , 06:38 PM
Last Post: tarekma7
  Critical RCE bug patched in Netgear ProSAFE Plus switches Bjyda 0 2,313 03-11-2021 , 10:29 PM
Last Post: Bjyda

Forum Jump:


Users browsing this thread: 1 Guest(s)