6.5 C
New York
Tuesday, December 1, 2020

Too late, but it’s here: Microsoft fixes a critical vulnerability that has been around since 1996 in Windows

Must Read

Iran claims to have identified the mastermind behind the assassination of Nuclear Scientist Fajrizade

The mastermind behind the assassination of Iranian nuclear physicist Mohsen Fajrizade has been identified, declared the secretary of Iran's...

Moderna claims 100% effectiveness of its Covid-19 vaccine for severe cases

The drugmaker Moderna will file documents with the US Food and Drug Administration today to obtain an emergency use...

Eight Foods and Drinks That Can Trigger Migraines

The causes of migraines are complex and not always known, however there are some foods that might be making...
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com

Microsoft has fixed on its Windows 10 system a critical vulnerability present in Windows since 1996 known as PrintDemon, which was present in the printing system and allowed attackers to view, change and delete files on the user’s computer.

The PrintDemon vulnerability exploits an elevation of privilege that can be performed in the Windows Print Spooler service, which helps computers interact with printers and manages the document print queue.

According to Microsoft, this security breach allows cybercriminals to arbitrarily upload code to the system and acquire elevated system privileges, with which it is possible to view, modify and delete user files and even install programs or create new accounts in the computer.

“To exploit this vulnerability, an attacker would have to log into the affected system and run a malicious ‘script’ or application created for it,” the US company acknowledged.

Print Spooler has contained this same vulnerability since it was released in Windows NT 4 in 1996, and was even used as part of the attacks carried out by the Stuxnet worm against nuclear facilities in Iran, according to cybersecurity researchers Alex Ionescu and Yarden Shafir.

Microsoft has now released a patch to fix this vulnerability (CVE-2020-1048) on their Windows 10 operating system, which fixes how the Windows Print Spooler component writes to the system.

- Advertisement -
- Advertisement -

Latest News

Iran claims to have identified the mastermind behind the assassination of Nuclear Scientist Fajrizade

The mastermind behind the assassination of Iranian nuclear physicist Mohsen Fajrizade has been identified, declared the secretary of Iran's...

Moderna claims 100% effectiveness of its Covid-19 vaccine for severe cases

The drugmaker Moderna will file documents with the US Food and Drug Administration today to obtain an emergency use of the vaccine. The updated results...

Eight Foods and Drinks That Can Trigger Migraines

The causes of migraines are complex and not always known, however there are some foods that might be making you spend hours and even...

Merriam-Webster Experts Pick ‘Pandemic’ as the Word of the Year 2020

Language experts at the Merriam-Webster online dictionary chose 'pandemic' as the word of 2020. "Sometimes a single word defines an era, and it is only...

An amateur astronomer finds 15 stars suitable for the possible source of the “Wow! Signal”

An amateur astronomer found 15 stars suitable for the role of the source of the Wow! a radio signal, which could have been sent...
- Advertisement -

More Articles Like This

- Advertisement -