From 7f824eab6b2441af45b2ba7e5d0c482d5b2d26a2 Mon Sep 17 00:00:00 2001 From: bjs0107 <65721409+bjs0107@users.noreply.github.com> Date: Fri, 23 Jul 2021 16:12:08 +0900 Subject: [PATCH] =?UTF-8?q?Update=20CVE-2021-34481=20=EC=86=8C=EA=B0=9C?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../CVE-2021-34481 \354\206\214\352\260\234" | 5 +++++ 1 file changed, 5 insertions(+) diff --git "a/202002503_\353\260\260\354\244\200\354\204\234_V0xe1/CVE-2021-34481 \354\206\214\352\260\234" "b/202002503_\353\260\260\354\244\200\354\204\234_V0xe1/CVE-2021-34481 \354\206\214\352\260\234" index 6f5cc7c..a8544dc 100644 --- "a/202002503_\353\260\260\354\244\200\354\204\234_V0xe1/CVE-2021-34481 \354\206\214\352\260\234" +++ "b/202002503_\353\260\260\354\244\200\354\204\234_V0xe1/CVE-2021-34481 \354\206\214\352\260\234" @@ -14,3 +14,8 @@ The workaround for this vulnerability is stopping and disabling the Print Spoole Windows의 Print Spooler서비스가 권한이 존재하는 파일 작업을 부적절하게 수행할 때, 권한상승 취약점이 존재합니다. 성공적으로 이를 악용하면 SYSTEM권한으로 임의의 공격용 코드를 실행할 수 도 있습니다. + + +[마이크로소프트 측 취약점 보안 업데이트 내역] +https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481\ +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34481