Vulnerability Exploitable Via Printer Protocols Affects All Windows Versions (softpedia.com) 78
An anonymous reader writes from a report via Softpedia: "Microsoft patched today a critical security vulnerability in the Print Spooler service that allows attackers to take over devices," reports Softpedia. "The vulnerability affects all Windows versions ever released. [Security firm Vectra discovered the vulnerability (CVE-2016-3238), which Microsoft fixed in MS16-087.] At its core, the issue resides in how Windows handles printer driver installations and how end users connect to printers. By default, in corporate networks, network admins allow printers to deliver the necessary drivers to workstations connected to the network. These drivers are silently installed without any user interaction and run under the SYSTEM user, with all the available privileges." An attacker can hack printers and replace these files with his own. The vulnerability is exploitable from both the local network, but also from the internet, thanks to protocols like Internet Printing Protocol or the webPointNPrint. The exploit can be delivered via ads or JavaScript code inside a compromised website. The vulnerability is actually an OS design issue and affects all Windows versions ever released. Microsoft also announced today plans to make its recently renamed Windows 10 Enterprise product available as a subscription for $7 per user per month, or $84 per year.
So completely ass backwards (Score:2)
Drivers belong on the printer, not the damn computer. Who dreamed up this shit?
Re: So completely ass backwards (Score:3)
Those like my employer where my present location has 1100 seats. I can't go around installing printer drivers all day or close the company down because we had to move a copier and the installed print driver only works for a specific port.
Reinstalling the driver 1100 times is not an option!
Re: (Score:2)
Those like my employer where my present location has 1100 seats. I can't go around installing printer drivers all day or close the company down because we had to move a copier and the installed print driver only works for a specific port.
Reinstalling the driver 1100 times is not an option!
Who has 1100 seats and DOESN'T have some form of automated deployment tool? That sounds like job #1 to me...
Re: (Score:2)
Seems like the simple solution to your "hack" is to lock the BIOS (so you cannot change boot order) and use full disk encryption.
what about remote people on the go who need to pri (Score:2)
what about remote people on the go who need to print be it at client site / a hotel / etc.
Re:So completely ass backwards (Score:5, Informative)
Well, the computer at least needs to have a good idea of the printer capabilities. I suppose we could put that in a plain-text file, and call it 'printcap' or something. Of course, we'll also need to know how to trigger those capabilities. Maybe some sort of in-band signaling with special characters, like escape codes.
That's all good, but what if we want more advanced features like graphics. We could generate bitmaps, but that would be terribly device-specific and bandwidth-hungry. How about we use an encoding that can encapsulate the way we intend the page to look? We could call it a 'page description language'. Yeah, that'd be cool.
Well, now that we've got that, we do need some software to take the output from a program and encode it in out page description language. Otherwise, each and every program would need to know each and every common PDL. That's dumb -- we should use a standard intermediate representation that each program can speak to the OS, and let the OS transform that into the PDL of the printer it's talking to!
OK, now we've got it: a common, logical way for programs to describe their output to the OS, the OS providing a translation service to send that representation to the printer, and page description languages that let us produce sophisticated output without having to generate and transmit bitmaps and escape codes for every little thing.
That would be much better that this 'printer driver' crap, right ;)
Re: So completely ass backwards (Score:1)
Whoosh...
Re: (Score:3)
a disturbingly high number of people. last job i had i was a SysAdmin for a manufacturer. everyone salaried had been there 20 - 40 years. they all had dual screen computers or laptops...and printed like there was no tomorrow to take reports around for review. i couldnt get them to stop.
im at a hospital now. less printing in general for some people, but its *required* that patients get some things in print. itll change one day, but not for a while.
Re:So completely ass backwards (Score:4, Insightful)
I am also wondering about why you actually need to run printer driver code with system privileges. Isn't that a wrong approach? Yes, I agree printer drivers might not be required at all, but why do network printer drivers need full system privileges?
Its not that they are trying to speak over some hardware bus or something, all they need to have is an interface to the OS where the documents come in, and a network fd or something. They don't even need access to the file system, do they. Maybe for some settings and a cache and stuff. But really, they can be totally sandboxed. But well its windows...
Re: (Score:3)
It's old and meant to have third party stuff hook into it.
Re: (Score:2)
Windows supports signature verification for print drivers - it is just disabled by default even though most current print drivers are signed. You can also configure Windows to only install print drivers served from specific print servers. Enabling either option would be pretty
sandbox (Score:2)
Trouble is, there are a lot of legacy printers with old legacy drivers.
The term "sandbox" comes to mind...
Re: (Score:1)
a PPD file should be all you need. don't even bother with anything else that requires more or requires proprietary drivers, especially when printing from systems other than windows.
Re: (Score:2)
The ones on the MS p
Explotable from the internet? (Score:2)
Re: (Score:2)
I think, yes, but very unlikely. If the user tries to print using a printer that is outside the NAT, then that printer could compromise the Windows installation.
Re: (Score:2)
Re: (Score:2)
If the printer is already compromised, yes. Note that "printer" in this scenario is more likely a print server, which could be running Windows, or perhaps a Linux/SAMBA box.
There might also be more scope for this with "cloud" print services, but I really don't know.
Re: (Score:2)
Re:Explotable from the internet? (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
True but I'm addressing the common and dangerous "NAT is security via obscurity therefor IPv6 should be avoided even though it can do NAT if you really want" myth. The bad guys can get through NAT easier than we would hope.
I know so many people who are otherwise quite technically competent who are terrified of IPv6 for this very reason and refuse to look into it, refuse to learn about it, refuse to check it out.
Samba? (Score:4, Interesting)
I'm not a Windows user or admin, but I'm curious:
Does Samba support the corresponding protocols and emulate this behavior (and is it compatible enough with Microsoft's code to support the exploit)?
Re: (Score:2, Informative)
Yes, if you share a printer using Samba you can optionally create the print$ share that windows will use when trying to download the drivers.
As documented at https://www.suse.com/communiti... [suse.com] (and many other places)
Easier exploit! (Score:5, Interesting)
Yes, if you share a printer using Samba you can optionally create the print$ share that windows will use when trying to download the drivers.
Interesting.
So bad guys don't even have to hack a printer to exploit this bug. They can just host a Samba print server (maybe even without a printer attached) with the nasty driver in its database. Anyone who tries to print on that "printer" from a Windows machine gets pwned.
Ought to fit in a BeagleBone, Raspberry, Shiva Plug, etc., or something even smaller, just fine. Plug it into an Ethernet LAN, or just plug in a USB WiFi dongle and it can advertise on the air like any other WiFi-connectable printer.
Add a battery, good for a few days, and they have a pocket-sized exploiter that they can carry or drop within radio range of an office, or bury in the packing material of something they mail to the victim.
If it can detect a local printer and masquerade as it, forwarding the print jobs to it, there might be no obvious sign that anything unusual was happening.
Re: (Score:3)
get an 2 port one and clone the mac of the printer stick an HP logo on it and it looks like it's part of the printer.
Re: (Score:3)
...assuming the client machines allowed random user to add random printers with unsigned drivers. Since Windows 7, the default is not to allow this so someone would have deliberately enable it.
Re: (Score:3)
Yes, if you share a printer using Samba you can optionally create the print$ share that windows will use when trying to download the drivers.
Interesting.
So bad guys don't even have to hack a printer to exploit this bug. They can just host a Samba print server (maybe even without a printer attached) with the nasty driver in its database. Anyone who tries to print on that "printer" from a Windows machine gets pwned.
Ought to fit in a BeagleBone, Raspberry, Shiva Plug, etc., or something even smaller, just fine. Plug it into an Ethernet LAN, or just plug in a USB WiFi dongle and it can advertise on the air like any other WiFi-connectable printer.
Add a battery, good for a few days, and they have a pocket-sized exploiter that they can carry or drop within radio range of an office, or bury in the packing material of something they mail to the victim.
If it can detect a local printer and masquerade as it, forwarding the print jobs to it, there might be no obvious sign that anything unusual was happening.
And call the fake printer something like "Expensive color printer, only use for serious stuff"
"There's an app for that!" (Score:2)
Ought to fit in a BeagleBone, Raspberry, Shiva Plug, etc., or something even smaller, just fine. ... plug in a USB WiFi dongle and it can advertise on the air like any other WiFi-connectable printer.
I wonder if there's an app for that?
Yet. (If there wasn't, I posted the above over 16 hours ago and it's REALLY simple to do.)
With such an app, any smartphone (of the matching O.S.) becomes a walk-around exploit delivery system.
What could possibly go wrong... (Score:4, Insightful)
Great idea to allow an external device to automatically install software on your computer.
What are these people thinking?... or not...
Re: (Score:2)
it has to be triggered from the target machine and requires admin rights, unless you go out of your way to set it up to not need admin rights.
To all those who disable Windows update (Score:2)
Ha!
Told ya so. Let's see how secure your system stays
Re: (Score:1)
I don't need Windows Update turned on to download this [microsoft.com].
javascript - surprise surprise. (Score:2, Insightful)
The exploit can be delivered via ads or JavaScript code inside a compromised website.
So yet again, time after time after goddamn time, javascript is the attack vector.
Look, we've seen thousands of stories over the past years of javascript allowing various exploits. It's time for people to realize that allowing random ads and web sites to run any form of explicit code on your computer is a bad idea. With descriptive languages like HTML, at least there is a shot at a proper sandbox and they lack the ability to do arbitrary things like this.
If you are still running javascript by default in
*ALL* windows versions? (Score:2)
hell, before 3.11, windows was not even network aware!
That's a pretty impressive exploit! /s
(idiot journalists...)
Re: (Score:2)
Windows 3.11 has been discontinued for decades. By "all versions" a company/journalist only refers to actively supported products. (TYL = Today You Learned)
Well, the bigger question is what's going on with XP (and what affects XP probably affects Win2K). I can't really tell if this is dependent on the NT model or if it's truly a higher level Windows design flaw, which probably would then go back to Win 95.
"Printer configuration for Windows 95 and System 7.5.3" are things I've probably intentionally blocked out from my memory.
Re: (Score:1)
That is NOT what they wrote. They explicitly stated "ever released". 3.11 was not only released publicly, it was a flagship product in its day-- it was WIDELY released.
the only thing i learned from you today is that you are an apologist for language arts professionals that fail at language arts, AC. Or perhaps that you dont understand that a journalist has a responsibility to use precise language, and research thier story to present a factual accounting of the story. Perhaps both.
In either case, the main
Too bad Windows Update isn't working (Score:2)
Downloading 12 updates (0 KB total, 0% complete)
For a fucking hour now.
aptitude -y update works every goddamned time.
What the actual fuck, Mickeysoft?
Re: (Score:2)
If Win7, install the June 2016 rollup. It's still optional. Fixes slow Windows Update.
I'm trying!
Re: (Score:3)
If you install the updates separately, you can track down the KB numbers from just about anywhere on the internet and uncheck/remove them.
Oh, balls. I can't remove the specific KB numbers for telemetry if I install the rollup? So now I have to uninstall the rollup, and go do the process manually? What a PITA.
Re: (Score:2)
Oh, balls. I can't remove the specific KB numbers for telemetry if I install the rollup? So now I have to uninstall the rollup, and go do the process manually? What a PITA.
Actually, it doesn't look like the rollup actually installed? I tried to wusa /uninstall it and it said that KB wasn't even installed. So I'm going through the telemetry removal process again just to make sure, but it looks like I can still uninstall the specific KB numbers, since there's no rollup KB to remove. I restarted in safe mode on the first reboot, maybe that made the update fail.
Re: (Score:2)
KB3168965 is this month's fix for the ever-slowing Win7 update process. Download whichever one applies to you, then reboot and immediately run the installer, before Windows Update has time to fire itself up and hog half your CPU for the next few hours. After rebooting again, Windows Update should do its thing more quickly until they break it again next month.
https://download.microsoft.com... [microsoft.com]
https://download.microsoft.com... [microsoft.com]
Best GIJOE episode ever... (Score:2)
Mod up.
let me guess what the fix for this will be (Score:1)
upgrade to Windows 10( also known as Windex and will wipe your data off your system and onto theirs ).
"Network Admins" (Score:2)