Пожалуйста, обратите внимание, что пользователь заблокирован
The Print Spooler Bug that Wasn’t in the Print Spooler
slidesIt all started with a “Print Spooler” 0-day privilege escalation, CVE-2022-41073, on investigation the fix in the spooler was almost trivial. However, based on issues Project Zero has discovered in the past it was clear the real vulnerability was inside the Windows DLL loader. To understand the fix a deeper dive into the internals of the loader and the role CSRSS plays in handling side by side assemblies was necessary, leading to the discovery of a series of not quite complete patches.
This talk takes you through the process of root causing an in-the-wild “Print Spooler” bug: from patch diffing, to finding an exploit sample, to diving into months of changes within Windows DLL loader. The result was identifying a Project Zero bug from 2019 which might have been the first variant of the 2022 vulnerability exploited in the wild.
We’ll give a primer on Windows Activation Contexts and the evolution of bugs in the area. We’ll look into a series of related bugs, going back many years, including three that were known to be actively exploited. We’ll also detail the many iterative fixes that Microsoft deployed that led to so many bugs, making this a prime attack surface. Finally, we’ll go over the new mitigations that Windows added in late 2022 and early 2023.
ConPresentations/OffensiveCon2023.PrintSpooler.pdf at master · maddiestone/ConPresentations
Slide decks from my conference presentations. Contribute to maddiestone/ConPresentations development by creating an account on GitHub.
video
youtube.com/watch?v=H03b0UaogVs&list=PLYvhPWR_XYJmh-qBNKUrlyjQYKBpCDZzB